Cybercrime and Fraud

Beyond the Login: Web Behavior Analytics Helps Retailers Stop Fraud

In a world of scammers, fraudsters and bad actors, there are two immutable rules thoroughly entrenched in the consciousness of IT professionals trying to stop them.  Rule 1: If there is something to monetize, cybercriminals will find it.  Rule 2: If you have a loophole or weak control on your website, cybercriminals will find it.…

The Role of Tor in Cybercrime

In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies (such as Tor) facilitate illegal, underground commerce.  This post aims to explain the underlying concept of how Tor functions, thus, how anonymity on the Internet is accomplished. An Overview of Tor and Internet Anonymity To understand how…

Does DDoS Takedowns Really Change Extortion Rules of Engagement?

The proliferation of account takeovers, DDoS attacks,  ransomware and outright cyber extortion targeting individuals and institutions is not only disrupting the hack attack landscape, but also raising questions around our rules of engagement. How are we supposed to deal with all of this knowing the bad guys aren’t playing by the same rules that we…

Taxpayers Beware: Phishing and Other Scams Coming to an Inbox Near You

The phone rang. My first mistake? Answering it. My second? Listening to the well-scripted gentlemen relay the following information: “Hello Ma’am” announced a voice with a distinct, almost halting South African accent, “I am calling from the IRS in Washington D.C. and you owe us money. If you do not send me a wire transfer…

Does EMV Make Online eCommerce Transactions Safer?

Ok, let’s get this quickly out of the way: EMV, the non-swipe chip-embedded credit cards are sturdy barriers against (in-person) credit card fraud.  However, when it comes to card-not-present eCommerce transactions (e.g. online ecommerce) where EMV is not a factor and where cybersecurity threats continue to proliferate, shouldn’t the customer experience be as secure and…

The Economics of Identity Theft in the Dark Web

If you ever want to find a reason to boycott the Internet, just go work for a security vendor.  The digital universe is a scary place, and the cybercriminals who operate within it never cease to amaze me with the level of sophistication they harness in their Dark Web businesses. The black market, although rife…

E4 – Storms on the Horizon – First Winds

The Siren sat demurely in her corner booth at the café watching the patrons with an air of casual indifference.  A closer inspection of her after a few minutes though would reveal the intensity of a predator as her eyes smoothly moved from one customer to the next.  She surveyed every table for a few…

Friendly Fraud and How to Keep Parents Safe Online

I recently read a great blog which discusses a child’s journey through the digital universe.  If you are a parent, especially of a young child, I highly recommend it.  The digital world offers so many amazing opportunities for our children to learn, yet there is certainly a dark side of which we must always be…

Reducing Fraudulent Transactions during the Holiday Shopping Season with Behavioral Analytics

While it may seem a bit early to be addressing the holiday shopping season, the giant nutcrackers are already towering over the pumpkins at the mall so I figured it was fair game. So what can we expect this holiday season? According to a National Retail Federation survey, average spending per person is expected to rise…

Digital Universe CyberSecurity Student Defenders in Action

After writing my blog about Students – Be the Next Defenders of the Digital Universe I received several inquiries about what RSA’s Anti-fraud Command Center does and how Purdue University works with that team.  Since this week’s national cyber security awareness month theme is Building the Next Generation of Cyber Professionals  it is perfect timing…