Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Forever 21 investigating payment card breach, but only few details were provided by the company [Read More]
Day trader indicted for his alleged role in a scheme that involved hacking brokerage accounts and using them to make fraudulent trades [Read More]
Former Secret Service agent already convicted for stealing Bitcoins from Silk Road gets more prison time for theft of digital currency from government wallet [Read More]
Estonia said it would suspend security certificates for up to 760,000 state-issued electronic ID-cards with faulty chips as of Friday midnight to mitigate the risk of identity theft. [Read More]
Hilton agrees to pay $700,000 in a settlement with New York and Vermont over the credit card breaches suffered by the company in 2014 and 2015 [Read More]
IBM launches Trusteer New Account Fraud, a product designed to help banks assess risks and authenticate users [Read More]
Amazon-owned Whole Foods Market said the recent payment card breach impacted nearly 100 locations across the U.S. [Read More]
Visa launches ID Intelligence, a new platform that allows card issuers, acquirers and merchants to adopt new biometric methods of their own preference [Read More]
Many victims of the Equifax hack had their personal information stolen by cybercriminals prior to the breach, IRS says [Read More]
Taiwan bank heist that resulted in the theft of $60 million has been linked to the North Korean hacker group known as Lazarus [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.