CEO Fraud: The New $2 Billion Phishing Scam
Like most employees, you don’t think twice before opening an email from your CEO. Given the latest email scam making the rounds in the workplace, maybe you should. Statistics show that the spear...
View ArticleFraud Investigation: A Big Job for Small Teams
RSA recently conducted a survey among security and fraud investigation professionals within the e-commerce industry to gauge the cyber threats and business challenges that plague them most. While many...
View ArticleLinkedIn Breach: The Death of Passwords Has Finally Arrived
The headline screamed at me this morning when I opened my inbox, “117 million LinkedIn user credentials compromised.” I had no reaction as I went to get my first cup of coffee. Credentials have...
View ArticleNot on My Dime: When Fraudsters Take a Phantom Ride
As any parent with children in sports knows, it is simply not possible to be in two places at the same time. I have tried to defy the laws of time and space by magically appearing at two different...
View ArticleNew PCI Multifactor Authentication Rules: Is it Too Late?
The PCI Security Council just extended its requirements for multi-factor authentication to anyone who has access to credit card data. These requirements, which comes on the heels of the European...
View ArticleMySpace and Tumblr Breaches Put Other Consumer Brands on Alert
With the unveiling of two more “mega breaches” this morning, the headlines and news cycles are clamoring for continued updates. The more serious of the two involved the breach at MySpace with 427...
View ArticleCurrent State of Cybercrime in 2016
The bon mot that “crime doesn’t pay” certainly predates the advent of cybercrime. Today, these digital hold-ups against businesses are highly profitable. Let’s face it: if cybercrime was a publicly...
View ArticleConsumer Security vs. User Experience in a Mobile World
Most people have had to go through the slow, and sometimes frustrating, process of standing in an airport security line at least once in their life. While not convenient for frequent flyers, we...
View ArticleIdentifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6
Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information...
View ArticleEnter at Your Own Risk: The Perils of Livestreaming Content
There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that...
View ArticleGDPR Post Brexit – Are You Getting Ready?
The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995. It’s been discussed in the EU for the last four years so hopefully,...
View ArticleCyber Scams to Beware of at the 2016 Summer Olympics
Are you planning to cheer on your country’s athletes in-person at the Summer Olympics in Rio and need some discounted tickets? Or maybe you can’t afford to actually travel there, but would love to win...
View ArticleHackers Hunt for Healthcare Records
What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner...
View ArticlePlay Pokemon Go? Know the Risks and How to Mitigate Them
Unless your home has been inside of a cave for the past week, you’ve certainly heard of Pokemon Go. Scratch that. Even if you have been living inside of a cave, chances are that someone inadvertently...
View ArticleWeb Threat Detection Services Deliver SWIFT Remediation
With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing...
View ArticleAccount Takeover Gains Full Visibility with Web Behavior Analytics
Interest in and adoption of web behavior analytics is surging because of its ability to interpret the navigation and intent of each visitor to the website and as one of the best ways to protect the...
View ArticleA New Generation of Hackers Target the Gaming Industry
Hackers love a crowd. That’s true when it comes to social media networks, government system websites, financial institutions, retailers, and, based on recent headlines, gaming sites. For an industry...
View ArticleYour Step-Up Authentication Compass… NIST & SMS – Finding North
An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST...
View ArticleThe Perils of Consumer Single Sign-On
From social media to gaming sites, every headline of a new breach makes me groan, “Time to change my password.” It’s a begrudging task, but I still have not been pwned. Aside from the risks...
View ArticleThe Value of Transaction Risk Analysis for Consumer Authentication
The recent consultation paper set forth by the European Banking Association (EBA) surrounding the call for comments on the regulatory technical requirements for strong customer authentication under...
View Article