Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. [Read More]
The FBI’s 2018 Internet Crime Report (ICR) shows that both the incidence and cost of internet crime continues to escalate. [Read More]
Djevair Ametovski, the Macedonian operator of a cybercrime marketplace named Codeshop, has been sentenced to 90 months in prison by US authorities. [Read More]
Several critics of Kaspersky Lab have been targeted by a mysterious individual in an operation similar to that targeting Citizen Lab recently. [Read More]
Most of the malicious activity by Brazilian hackers is within Brazil against Brazilians, but this does not mean that Brazil lacks hacking capabilities, nor that the rest of the world can ignore Brazilian hackers. [Read More]
An underground invitation-based marketplace for stolen digital fingerprints, named Genesis, offers more than 60,000 stolen bot profiles. [Read More]
Malicious code designed to steal payment card data was present for over 4 months on the website of AeroGrow, the company that makes the AeroGarden smart countertop gardens. [Read More]
Canada's foreign minister warned Friday that outside interference in the country's upcoming parliamentary election was "very likely". [Read More]
An Israeli cyber watchdog said Monday it has uncovered a network of fake online accounts backing Prime Minister Benjamin Netanyahu and slandering opponents ahead of next week's general election. [Read More]
The company that owns the Buca di Beppo, Earl of Sandwich and Planet Hollywood brands has admitted that tens of restaurants were hit by a payment card breach. Over 2.1 million cards may have been compromised. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.