Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Profit-driven cybercrime group tracked as FIN10 has extorted many organizations, particularly casinos and mining companies in Canada [Read More]
Approximately 3,000 European Union citizens fell victim to an international criminal network of payment card fraudsters, that installed skimming devices on an average of 400 ATMs every year. [Read More]
GameStop finally confirms hackers stole personal and payment card data from its website - attackers had access between August 2016 and February 2017 [Read More]
Spear-phishing attacks are increasingly focused - a study by IRONSCALES found that most attacks only targeted 10 inboxes or less [Read More]
Three Nigerians sentenced to 115, 95 and 25 years in prison for their role in a massive international fraud scheme [Read More]
Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]
Russian authorities dismantle cybercrime gang responsible for infecting 1 million Android phones with a banking Trojan and stealing nearly $900,000 [Read More]
Risks posed by SS7 flaws are no longer just theoretical – cybercriminals exploited vulnerabilities to steal money from bank accounts [Read More]
Travel technology giant Sabre tells SEC it’s investigating a payment card breach related to a hotel reservations product [Read More]
Mastercard announces launch of new biometric card that combines chip technology with fingerprints [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.