Security Experts:

long dotted


Subscription meal kit service Home Chef has confirmed that it recently suffered a data breach impacting customer information. [Read More]
NortonLifeLock has released the beta version of BotSight, a free browser extension that allows Twitter users to easily identify bots on the social media platform. [Read More]
Nigerian cybercriminals specialized in BEC attacks were observed leveraging COVID-19 lures in recent attacks on healthcare and government organizations. [Read More]
European authorities say they have dismantled the “InfinityBlack” cybercrime group after arresting several individuals in Poland and Switzerland. [Read More]
Individuals and criminal organizations have taken immediate advantage of the COVID-19 pandemic to find new ways of making money, says Europol, citing a spike in counterfeiting and cybercrime. [Read More]
Google said Thursday its task force devoted to fighting "bad" ads hawking bogus coronavirus cures, illegitimate unemployment benefits and overpriced medical supplies had blocked tens of millions of messages. [Read More]
A piece of Android ransomware uses a scareware tactic to extort money from victims: it asks them to provide their credit card information to pay a fine. [Read More]
Google this week announced a new set of rules for its Chrome Web Store, meant to ensure that developers don’t spam users with extensions that have similar functionality. [Read More]
A collection of approximately 400,000 payment card records, mainly from South Korea and the United States, has emerged on the dark web this month. [Read More]
Cybercriminals are taking advantage of the pandemic, including hackers who target hospitals and medical research institutions that are studying the coronavirus, said the head of the FBI’s cyber division. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?
Idan Aharoni's picture
To maximize profits, fraudsters need to do a lot of learning. They can either learn techniques of areas they haven't focused on yet, learn better techniques in the field they already specialize in, or learn new cover stories to improve the techniques they already use.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Idan Aharoni's picture
A bank that will fail to give fraud departments the power to make the necessary changes to its internal processes, may end up in a situation where everyone knows how and why fraudsters are stealing money from their bank – yet nothing can be done to stop it.
Robert Vamosi's picture
Some newer POS systems in the US have built-in authentication systems designed to protect merchants against the addition of fraudulent PIN pads. Should PCI now require retail businesses to upgrade to newer and better technology?