Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

U.S. SEC releases updated guidance on data breach disclosures and advises companies to adopt policies that ban executives from trading during security incident investigations [Read More]
SWIFT attacks: Russia’s Central Bank says one of the country’s financial institutions lost $6 million, and hackers attempted to steal $2 million from India’s City Union Bank [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]
Russian national Pyotr (Peter) Levashov, accused of being the mastermind behind the Kelihos botnet, extradited from Spain to the U.S. [Read More]
RELX Group, a provider of b2b Information and analytics services, has agreed to acquire fraud detection firm ThreatMetrix for £580m (approximately $815 million) in cash. [Read More]
National Stores, which operates over 300 Fallas and other clothing stores across the U.S., admitted that hackers had access to its payment systems for five months [Read More]
Bell Canada informed customers that their information was illegally accessed. Names, email addresses and other data on 100,000 individuals compromised [Read More]
High-Tech Bridge improves Trademark Monitoring Radar with new feature designed to identify squatted or fraudulent accounts on social networks and code repositories [Read More]
Clothing retailer Forever 21 informed customers that malware collected data from its payment systems for a period of more than 7 months [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Idan Aharoni's picture
While fraudsters may be equal in terms of rank, when it comes to sophistication – they are not. Much like in the hacking community, the higher the sophistication level of individuals, the lesser they are in numbers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Tom Grubb's picture
The day after Twin Towers fell, all kinds of security measures changed and new ones were implemented overnight. Is there a Web identity 911 equivalent wake-up call coming—a single event that will suddenly jolt us into enforced standards overnight?
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Tom Grubb's picture
When it comes to fighting online fraud, the burning issue with cookies isn’t about privacy at all—it’s about the death of the cookie as a usable way to identify your device. It’s no secret in the fraud prevention business that cookies turned stale long ago.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...
Tom Grubb's picture
Get ready CSOs and IT security pros because the new black hat is here and you won’t see him wearing a black hat...
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?