Security Experts:

long dotted


US-based online fashion retailer SHEIN informed customers recently that hackers stole their personal information. Over 6.4 million customers affected [Read More]
The recent Click2Gov attacks, which have targeted several cities in the U.S., are apparently carried out by a previously unknown financially motivated group [Read More]
Three men who admitted creating Mirai and using the botnet to launch attacks avoid prison after assisting the FBI in other complex cybercrime investigations [Read More]
Symantec launches free service designed to make elections more secure by helping candidates and political organizations detect fake websites [Read More]
President Donald Trump signed an executive order Wednesday authorizing sanctions against foreigners who meddle in U.S. elections, acting amid criticism that he has not taken election security seriously enough [Read More]
Greece's Supreme Court on Friday said a Russian held in Greece for allegedly laundering $4 billion using the bitcoin digital currency should be extradited to Russia [Read More]
Mobile, as a financial fraud threat vector, is growing dramatically. Fifty-eight percent of digital transactions now originate from mobile devices, and one-third of attacks are via mobile. [Read More]
Google will introduce a new verification program for tech support ads in an effort to keep scams off its advertising platform [Read More]
FireEye discovers a significant influence operation believed to be conducted by Iran against the US, UK, Latin America and the Middle East [Read More]
Researchers disclosed the details of two serious vulnerabilities affecting ATM dispenser controllers from NCR. The flaws could have been exploited to install vulnerable firmware and get ATMs to dispense cash [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.