Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
The recent Equifax breach affects roughly 100,000 Canadian consumers, but the company’s Canada systems are not impacted [Read More]
While the data stolen in the Equifax hack might be up for sale, scammers have also set up websites offering the data [Read More]
Justin Liverman, member of Crackas With Attitude hacker group, sentenced to 5 years in prison for hacking accounts of U.S. officials [Read More]
Apache Struts 2 vulnerability reportedly exploited to hack Equifax and gain access to customer data [Read More]
Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]
Hackers are selling phone numbers and email addresses of millions of celebrities and other high profile Instagram users [Read More]
Vulnerabilities in PoS systems from SAP and other vendors allow hackers to steal payment card data and change prices [Read More]
Cybercriminals have again started creating Android malware that abuses WAP billing to make a profit [Read More]
OurMine hackers take control of PlayStation Facebook and Twitter accounts, and claim to have obtained PlayStation Network databases [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Tom Grubb's picture
The day after Twin Towers fell, all kinds of security measures changed and new ones were implemented overnight. Is there a Web identity 911 equivalent wake-up call coming—a single event that will suddenly jolt us into enforced standards overnight?
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Tom Grubb's picture
When it comes to fighting online fraud, the burning issue with cookies isn’t about privacy at all—it’s about the death of the cookie as a usable way to identify your device. It’s no secret in the fraud prevention business that cookies turned stale long ago.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...
Tom Grubb's picture
Get ready CSOs and IT security pros because the new black hat is here and you won’t see him wearing a black hat...
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?
Tom Grubb's picture
Why use a gun to commit a robbery when you can use credit cards and stolen identities? Every fraudster, scammer and organized cybercriminal knows the five Big A’s: The five big advantages of doing crime online.