Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The hacking of U.S. election systems, including by foreign adversaries, is inevitable, and the real challenge is ensuring the country is resilient enough to withstand catastrophic problems from cyber breaches, government officials said. [Read More]
Canadian authorities announce that Defiant Tech, the company that ran LeakedSource, pleaded guilty to trafficking identity information and possession of property obtained through crime. [Read More]
The GAO Makes Recommendations to IRS Improve Security of Taxpayer Information [Read More]
Hackers have stolen over 7,000 bitcoins (worth over $40 million) after breaching the systems of Binance, one of the world’s largest cryptocurrency exchanges. [Read More]
German police have shut down one of the world's largest illegal online markets in the so-called darkweb and arrested the three men allegedly running it. [Read More]
The United States has indicted a Russian national for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. [Read More]
Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. [Read More]
The FBI’s 2018 Internet Crime Report (ICR) shows that both the incidence and cost of internet crime continues to escalate. [Read More]
Djevair Ametovski, the Macedonian operator of a cybercrime marketplace named Codeshop, has been sentenced to 90 months in prison by US authorities. [Read More]
Several critics of Kaspersky Lab have been targeted by a mysterious individual in an operation similar to that targeting Citizen Lab recently. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.