Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Armorblox emerges from stealth mode with a platform that uses natural language understanding to detect threats hidden in emails and documents. The company also announced a $16.5 million Series A funding round. [Read More]
A security breach suffered by PoS solutions provider North Country Business Products resulted in the exposure of payment cards used at over 130 restaurants and hotels in the US. [Read More]
nsKnox, a company that specializes in corporate payment protection solutions, raises $15 million in a Series A funding round led by Viola Ventures and M12, Microsoft’s venture fund. [Read More]
Wendy’s agrees to pay $50 million to settle a lawsuit brought by financial institutions in response to a massive data breach that hit the company in 2015 and 2016. [Read More]
Malta's largest bank was the target of a cyber attack Wednesday, with hackers attempting to withdraw 13 million euros ($14.7 million). [Read More]
UK-based Identity Data Intelligence specialist GBG has agreed to acquire the Atlanta-based identity verification and fraud prevention services provider IDology for $300 million in cash. [Read More]
Huddle House, a casual dining and fast food chain with over 300 restaurants, informs customers of a payment card breach. [Read More]
Companies that sold fake social media activity have reached a settlement with the state of New York in a case that, for the first time, established such activity as illegal. [Read More]
False positives in fraud detection are one of the biggest problems in eCommerce, as they can have a direct and serious effect on profitability. [Read More]
Bangladesh will soon file a lawsuit in New York against a Philippine bank over its involvement in one of the biggest-ever cyber heists, the country's central bank governor said. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?
Idan Aharoni's picture
To maximize profits, fraudsters need to do a lot of learning. They can either learn techniques of areas they haven't focused on yet, learn better techniques in the field they already specialize in, or learn new cover stories to improve the techniques they already use.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Idan Aharoni's picture
A bank that will fail to give fraud departments the power to make the necessary changes to its internal processes, may end up in a situation where everyone knows how and why fraudsters are stealing money from their bank – yet nothing can be done to stop it.
Robert Vamosi's picture
Some newer POS systems in the US have built-in authentication systems designed to protect merchants against the addition of fraudulent PIN pads. Should PCI now require retail businesses to upgrade to newer and better technology?
Idan Aharoni's picture
Unlike real-world dumpster diving, "electronic dumpster diving" can enable cybercriminals to access all the documents currently held by the user, not just those that were thrown away.
Noa Bar-Yosef's picture
Second column in a series describing the hottest commodities found in underground markets. We continue to explore the trending “commodities” in these markets and how to protect from your data being exchanged in these markets.