Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A breach at billing collections service provider American Medical Collection Agency (AMCA) could impact many of its customers. One victim is Quest Diagnostics and 12 million of its patients. [Read More]
New York State Department of Financial Services (DFS) launches a new cybersecurity division whose role is to protect consumers and financial organizations from cyber threats. [Read More]
Facebook said it recently disabled billions of bogus accounts set up by "bad actors" and that five percent of active accounts are likely fakes. [Read More]
The hacking of U.S. election systems, including by foreign adversaries, is inevitable, and the real challenge is ensuring the country is resilient enough to withstand catastrophic problems from cyber breaches, government officials said. [Read More]
Canadian authorities announce that Defiant Tech, the company that ran LeakedSource, pleaded guilty to trafficking identity information and possession of property obtained through crime. [Read More]
The GAO Makes Recommendations to IRS Improve Security of Taxpayer Information [Read More]
Hackers have stolen over 7,000 bitcoins (worth over $40 million) after breaching the systems of Binance, one of the world’s largest cryptocurrency exchanges. [Read More]
German police have shut down one of the world's largest illegal online markets in the so-called darkweb and arrested the three men allegedly running it. [Read More]
The United States has indicted a Russian national for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. [Read More]
Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.