Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Signifyd, a company that provides fraud protection solutions for e-commerce businesses, raised $100 million in a Series D funding round and opened its first European branch [Read More]
Two major Canadian banks launch an investigation after hackers claim to have obtained customer information as a result of a data breach [Read More]
Russian police arrest Russian national involved in a scheme that helped cybercriminals make up to $8,000 per day using Android banking Trojans [Read More]
Drupal websites hacked via the Drupalgeddon2 and Drupalgeddon3 vulnerabilities deliver cryptocurrency miners, RATs and tech support scams [Read More]
A dataset allegedly containing 200 million unique sets of personally identifiable information (PII) exfiltrated from several popular Japanese website databases emerged on underground forums [Read More]
A report from the Senate Intelligence Committee says Russian hackers attempted to undermine confidence in the voting process in the 2016 election, but there is no evidence that they manipulated votes or modified voter registration data [Read More]
Gold Galleon: Nigerian hackers target global maritime shipping businesses and their customers in BEC attacks [Read More]
Vast majority of the exhibitors at the RSA Conference have not implemented DMARC on their primary domains, opening the door to fraudulent and fake emails [Read More]
Trend Micro unveils Writing Style DNA, an AI-powered capability that uses writing style analysis to detect business email compromise (BEC) attacks [Read More]
Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Idan Aharoni's picture
While fraudsters may be equal in terms of rank, when it comes to sophistication – they are not. Much like in the hacking community, the higher the sophistication level of individuals, the lesser they are in numbers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Tom Grubb's picture
The day after Twin Towers fell, all kinds of security measures changed and new ones were implemented overnight. Is there a Web identity 911 equivalent wake-up call coming—a single event that will suddenly jolt us into enforced standards overnight?
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Tom Grubb's picture
When it comes to fighting online fraud, the burning issue with cookies isn’t about privacy at all—it’s about the death of the cookie as a usable way to identify your device. It’s no secret in the fraud prevention business that cookies turned stale long ago.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...
Tom Grubb's picture
Get ready CSOs and IT security pros because the new black hat is here and you won’t see him wearing a black hat...
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?