Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]
Best Buy customers may have had their payment card data stolen as a result of the breach suffered by online services provider [24]7.ai. [Read More]
Delta Air Lines, Sears Holdings and likely other major companies were affected by a payment card breach suffered last year by online services provider [24]7.ai [Read More]
Ukrainian national suspected of being the mastermind of a gang that used Carbanak malware to steal more than €1 billion from banks arrested in Spain [Read More]
Fraud prevention and risk management solutions provider Sift Science raises $53 million in Series D funding round, bringing the total raised to date to $107 million [Read More]
Hackers breached Expedia-owned travel website Orbitz and may have stolen as many as 880,000 payment cards [Read More]
The adoption of chip-and-PIN technology by an increasing number of U.S. merchants has led to a 70% decrease in counterfeit card fraud, says Visa [Read More]
U.S. SEC releases updated guidance on data breach disclosures and advises companies to adopt policies that ban executives from trading during security incident investigations [Read More]
SWIFT attacks: Russia’s Central Bank says one of the country’s financial institutions lost $6 million, and hackers attempted to steal $2 million from India’s City Union Bank [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.