Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Forescout researchers warn that improperly generated ISNs (Initial Sequence Numbers) leave TCP connections exposed to malicious hacker attacks. [Read More]
Microsoft drops a mega patch batch for February: 56 documented vulnerabilities, 11 rated critical, one under active attack. [Read More]
Endpoint security firm SentinelOne expects the $155 million deal to buy Scalyr will speed up its push into the lucrative XDR (Extended Detection and Response) market. [Read More]
In an SEC filing, North American trucking and freight transportation logistics giant Forward Air Corporation said a December 2020 ransomware attack led to loss of revenues in the range of $7.5 million. [Read More]
The switching and networking giant patches a wide range of high-severity security vulnerabilities in VPN routers and SD-WAN in the small business segment. [Read More]
Microsoft says BEC scammers are trying to trick K-12 school teachers into buying them gift cards. [Read More]
Qualys researchers discover a major security hole in the well-known Sudo utility. [Read More]
Apple confirmed that malicious hackers are exploiting serious security flaws in its flagship iOS and iPad OS platforms. Details are scant. [Read More]
A new phishing campaign delivering fake Office 365 password expiration reports has managed to compromise tens of C-Suite email accounts, Trend Micro warns. [Read More]
With Microsoft Edge 88.0.705.50, users get a built-in strong password generator that allows them to easily set up new passwords when signing up for new accounts or when changing the old passwords. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.