cybercrime

Beyond the Login: Web Behavior Analytics Helps Retailers Stop Fraud

In a world of scammers, fraudsters and bad actors, there are two immutable rules thoroughly entrenched in the consciousness of IT professionals trying to stop them.  Rule 1: If there is something to monetize, cybercriminals will find it.  Rule 2: If you have a loophole or weak control on your website, cybercriminals will find it.…

The Role of Tor in Cybercrime

In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies (such as Tor) facilitate illegal, underground commerce.  This post aims to explain the underlying concept of how Tor functions, thus, how anonymity on the Internet is accomplished. An Overview of Tor and Internet Anonymity To understand how…

The Dark Web: Coming to a Retailer Near You

As retailers, financial institutions and payment processors around the globe prepare for the upcoming year, it should come as no surprise that cybercriminals in the Dark Web are doing the same. From the POS terminal to the mobile device, fraudsters are building their arsenal of cyber weapons to strike at every point along the way.…

Friendly Fraud and How to Keep Parents Safe Online

I recently read a great blog which discusses a child’s journey through the digital universe.  If you are a parent, especially of a young child, I highly recommend it.  The digital world offers so many amazing opportunities for our children to learn, yet there is certainly a dark side of which we must always be…

E3 – Hordes at the Gate – Technical Dialogue

In Episode 3 “Hordes at the Gate,” the Kingdom endures the full force of the Brute’s power. A devastating and impeccably planned siege and assault on the Kingdom’s defenses leaves the empire bruised and battered but not defeated.  Through valiant efforts, the fortifications hold and the hordes are repelled. However, it is revealed that the…

E3 – Hordes at the Gate – The Call of the Siren

“Don’t you think you are being a bit paranoid?” Greg asked Marty as the two exited the cafeteria.  “I mean, the DDOS attack was pretty severe. I think whoever was behind it accomplished their goal. Look at all the time and expense it took to control it. Not to mention the downtime, the annoyed customers,…

E3 – Hordes at the Gate – The Aftermath

Marty walked into the conference room and immediately sensed the buzz and tension.  He knew the debrief of the denial of service attack was going to be a long one but he didn’t anticipate this much friction.  The source of the stress wasn’t the actual attack or the mayhem that ensued to protect MagnaCorp from…

E3 – Hordes at the Gate – The Battle

The Hunter arrived on the wall of the fortress on the frontier out of breath. He had ridden through the night to get to the most active and dangerous part of the assault on the Kingdom’s walls. He leaned over the parapet and quickly surveyed the chaos below him. Within seconds an arrow whizzed past…

E3 – Hordes at the Gate – The Siege

The hulking figure dominating the corner of the crowded tavern was given a wide berth by the other patrons.  Even though the smoky room was packed with people, the table occupied by the massive man had plenty of space around it.  Several customers made obvious attempts not to trespass over the imaginary border circling the…

Understanding human triggers in fraudulent transactions

  Too often, discussions about fraud prevention emphasize the security controls organizations should put in place: risk engines, step-up authentication, biometrics… These are all necessary for a successful fraud prevention program, but we tend to minimize the ‘humans in the loop’ aka the end users. It’s human nature to have biases, and an effective security program should…