Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

In a legal brief, Mozilla warns that “the security of millions of individuals using Mozilla’s Firefox Internet browser could be put at risk by a premature disclosure of the vulnerability. [Read More]
Malware actors are exploiting the Flash Player vulnerability, which affects machines running Windows, Mac OS X, Linux and Chrome OS. [Read More]
Several people accused of abusing the IRS’s Get Transcript service in tax fraud schemes plead guilty [Read More]
The IRS has temporarily suspended its Identity Protection PIN tool while it strengthens its security features [Read More]
The IRS said the total number of taxpayers affected by the “Get Transcript” incident is double than previously reported [Read More]
The IRS discovered that identity thieves attempted to generate E-File PINs using 464,000 stolen social security numbers [Read More]
Pindrop Security, a startup focused on combating phone-based fraud, announced that it has raised $75 million in a Series C funding round led by Google Capital, bringing the total raised by the company to $122 million. [Read More]
Cybercriminals steal more than $50 million from Austrian aircraft parts maker FACC after targeting the company’s finance department [Read More]
Hackers had access for 4 months to the systems used to process card payments for 250 Hyatt hotels from all over the world [Read More]
LifeLock agreed to pay a fine of $100 million for failing to protect consumer data in the largest settlement on record, officials said. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?
Idan Aharoni's picture
To maximize profits, fraudsters need to do a lot of learning. They can either learn techniques of areas they haven't focused on yet, learn better techniques in the field they already specialize in, or learn new cover stories to improve the techniques they already use.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.