Security Experts:

long dotted


A sophisticated cybercrime group has stolen payment card data from hundreds of websites over the past years using JavaScript sniffer malware. [Read More]
A man from Ghana was recently extradited to the United States over his role in various types of cybercrime schemes that caused millions of dollars in losses. [Read More]
A man authorities say participated in a scam to steal victims’ banking information by offering phony computer tech support services has pleaded guilty, federal prosecutors say. [Read More]
An advertising SDK made by a Chinese company and present in over 1,200 iOS apps in Apple’s App Store can conduct ad fraud and harvest user data, researchers claim. [Read More]
CISA and the FBI have issued an alert to warn of a voice phishing (vishing) campaign targeting employees of multiple organizations. [Read More]
Anti-fraud platform provider SpyCloud on Tuesday announced that it raised $30 million in a Series C funding round. [Read More]
Cybercrime groups claiming to be Fancy Bear and Armada Collective have been threatening organizations with DDoS attacks. [Read More]
Tyler King, a 31-year-old from Texas, has been sentenced to 57 months in prison for hacking and identity theft. [Read More]
A judge in Paris has ordered a French trial for Alexander Vinnik, a Russian suspected of money laundering on the bitcoin exchange BTC-e, also wanted by Washington and Moscow. [Read More]
Cybercriminals could be stealing data from EMV payment cards and using it to create magnetic stripe cards which they can use for card-present transactions. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.