Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Day trader indicted for his alleged role in a scheme that involved hacking brokerage accounts and using them to make fraudulent trades [Read More]
Former Secret Service agent already convicted for stealing Bitcoins from Silk Road gets more prison time for theft of digital currency from government wallet [Read More]
Estonia said it would suspend security certificates for up to 760,000 state-issued electronic ID-cards with faulty chips as of Friday midnight to mitigate the risk of identity theft. [Read More]
Hilton agrees to pay $700,000 in a settlement with New York and Vermont over the credit card breaches suffered by the company in 2014 and 2015 [Read More]
IBM launches Trusteer New Account Fraud, a product designed to help banks assess risks and authenticate users [Read More]
Amazon-owned Whole Foods Market said the recent payment card breach impacted nearly 100 locations across the U.S. [Read More]
Visa launches ID Intelligence, a new platform that allows card issuers, acquirers and merchants to adopt new biometric methods of their own preference [Read More]
Many victims of the Equifax hack had their personal information stolen by cybercriminals prior to the breach, IRS says [Read More]
Taiwan bank heist that resulted in the theft of $60 million has been linked to the North Korean hacker group known as Lazarus [Read More]
Pizza Hut hacked. Users who placed an order on the website or via the mobile app may have had their credit card data stolen [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Idan Aharoni's picture
While fraudsters may be equal in terms of rank, when it comes to sophistication – they are not. Much like in the hacking community, the higher the sophistication level of individuals, the lesser they are in numbers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Tom Grubb's picture
The day after Twin Towers fell, all kinds of security measures changed and new ones were implemented overnight. Is there a Web identity 911 equivalent wake-up call coming—a single event that will suddenly jolt us into enforced standards overnight?
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Tom Grubb's picture
When it comes to fighting online fraud, the burning issue with cookies isn’t about privacy at all—it’s about the death of the cookie as a usable way to identify your device. It’s no secret in the fraud prevention business that cookies turned stale long ago.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...
Tom Grubb's picture
Get ready CSOs and IT security pros because the new black hat is here and you won’t see him wearing a black hat...
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?