Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A Nigerian national who has more than 2.5 million followers on Instagram was extradited from the United Arab Emirates and appeared in court in the US to face cybercrime-related charges. [Read More]
Hackers linked to the North Korean government are believed to be behind the Magecart attacks on Claire’s and other online stores. [Read More]
A Nigerian national has been accused of orchestrating an international cyber fraud scheme that federal prosecutors say defrauded U.S. businesses in six states out of tens of millions of dollars. [Read More]
A Russian national pleaded guilty last week for his role in an international cyber theft ring that caused losses of more than $568 million. [Read More]
Magecart web skimmers were found on the websites of eight cities in the United States and one thing they have in common is that they all use the Click2Gov platform. [Read More]
Police in Germany have arrested 32 people and detained 11 after nationwide raids targeting users of an illegal online platform. [Read More]
COVID-19 is fueling phishing and scams while BEC attacks continue to evolve and increase, according to a report from Abnormal Security. [Read More]
New Zealand police has frozen NZ$140 million (US$90 million) in assets linked to a Russian man accused of laundering money for organised crime using cyber currency. [Read More]
The U.S. Treasury Department and the Justice Department announce sanctions against six Nigerian nationals for their involvement in BEC and romance fraud schemes. [Read More]
The alleged hacker who breached the human resource databases of University of Pittsburgh Medical Center in 2014 was arrested this week in Detroit. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.