Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Twenty-four individuals were arrested for laundering funds illegally obtained via business email compromise (BEC), romance, and retirement account scams targeting victims across the United States. [Read More]
European authorities managed to crack down on two cybercrime gangs responsible for stealing millions by employing SIM hijacking. [Read More]
Facebook has sued domain registrar Namecheap over its refusal to provide information on tens of domains that impersonated the social media company. [Read More]
What started as almost casual research in November 2019 and disclosed to various vendors as a vulnerability, was abruptly reclassified and treated as a zero-day vulnerability on February 13, 2020. [Read More]
Mobile payment fraud is growing, and is growing faster in the mobile ecosystem than anywhere else. [Read More]
A group of researchers at Ruhr-Universität Bochum and NYU Abu Dhabi have discovered a new attack on 4G and 5G mobile networks that can be used to impersonate users. [Read More]
A group of business email compromise (BEC) scammers that targeted thousands in the United States employed Google’s G Suite for their infrastructure. [Read More]
Just weeks into this year’s election cycle, Russia already is actively interfering in the U.S. presidential campaign in hopes of reelecting President Donald Trump, and is also trying to help the candidacy of Sen. Bernie Sanders on the Democratic side. [Read More]
Rising interest in electronic voting has heightened concerns among security experts who fear these systems are vulnerable to hacking and manipulation that could undermine confidence in election results. [Read More]
Puerto Rico’s government has suspended three employees as federal agents investigate an online scam that attempted to steal more than $4 million from the U.S. territory. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.