Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Nigerian cybercriminals specialized in BEC attacks were observed leveraging COVID-19 lures in recent attacks on healthcare and government organizations. [Read More]
European authorities say they have dismantled the “InfinityBlack” cybercrime group after arresting several individuals in Poland and Switzerland. [Read More]
Individuals and criminal organizations have taken immediate advantage of the COVID-19 pandemic to find new ways of making money, says Europol, citing a spike in counterfeiting and cybercrime. [Read More]
Google said Thursday its task force devoted to fighting "bad" ads hawking bogus coronavirus cures, illegitimate unemployment benefits and overpriced medical supplies had blocked tens of millions of messages. [Read More]
A piece of Android ransomware uses a scareware tactic to extort money from victims: it asks them to provide their credit card information to pay a fine. [Read More]
Google this week announced a new set of rules for its Chrome Web Store, meant to ensure that developers don’t spam users with extensions that have similar functionality. [Read More]
A collection of approximately 400,000 payment card records, mainly from South Korea and the United States, has emerged on the dark web this month. [Read More]
Cybercriminals are taking advantage of the pandemic, including hackers who target hospitals and medical research institutions that are studying the coronavirus, said the head of the FBI’s cyber division. [Read More]
A Connected TV (CTV) ad fraud operation managed to generate as much as 28% of the CTV traffic observed in January 2020 by White Ops. [Read More]
The SEC has reached a settlement with two people accused of making a profit by trading based on information stolen by a hacker from the agency’s EDGAR system. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.