Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers from RSA have discovered the server infrastructure behind a point-of-sale (PoS) attack campaign that has infected systems mostly in the United Sates, but also in 10 other countries including Russia, Canada and Australia.
Successful exploitation of these vulnerabilities could potentially result in an attacker executing code in the context of the application that opens specially crafted Flash content
Details on the security breach are limited but the company said the theft of credit card data "may have occurred from sometime in October 2013 to early November 2013."
The Las Vegas-based company said customer credit and debit card information at all of its Casinos was compromised in a breach that occurred between March 14 and October 16.
The free Windows tool is actually a data-theft Trojan capable of stealing log-in credentials and bitcoins.
The European Union's banking watchdog issued a warning over virtual currency trading amid huge swings in the value of Bitcoin.
A new study by the Ponemon Institute finds malware installed via zero-day exploits presents the biggest threat to corporate data.
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Please join Trend Micro and SecurityWeek on Thursday, Dec. 5th at Ruth's Chris Steakhouse in Bellevue, WA for an interactive security event with great food and open bar!
Individual phone fraudsters targeted anywhere from 5-10 accounts to as many as 200-300 accounts, often working in groups ranging from 2 to 12 members, according to a new report.

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?
Idan Aharoni's picture
To maximize profits, fraudsters need to do a lot of learning. They can either learn techniques of areas they haven't focused on yet, learn better techniques in the field they already specialize in, or learn new cover stories to improve the techniques they already use.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Idan Aharoni's picture
A bank that will fail to give fraud departments the power to make the necessary changes to its internal processes, may end up in a situation where everyone knows how and why fraudsters are stealing money from their bank – yet nothing can be done to stop it.