cybercrime

The Industrialization of Cybercrime: Driving Innovations in Security

If you compare the world of cybercrime now to that of 10 years ago, there really is no comparison. Whether one measures its impact through estimated profits – which some estimate as now surpassing those of the profits for illegal drugs – or from the scale, scope, and sophistication of available “black hat” services and…

Find Friends and Credit Cards on Facebook: The New Cybercrime Reality

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. With the release of the second…

Ransomware: The New Cyber Kryptonite

And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a similar defense against a strain of ransomware that recently, albeit briefly, infected its own Mac computers. The recent…

A Tale of One Password and Unhappily Ever After for Retailers

Do you recycle? I’m not talking here about paper, glass and aluminum waste. I mean online passwords.  For most consumers, password recycling is a given which exposes them to a wide variety of other identity theft risks.  However, poor identity management practices on the part of consumers also puts retailers and e-commerce merchants at risk…

Phishing Lives On with New Bait

The saying “Gone Fishing” on the once prosaic signs hanging from rural-based gas stations or car repair shops has evolved to mean something completely different in 2016. While phishing attacks are not growing by leaps and bounds like other types of cyber threats, it is certainly showing no signs of slowing down. Last year, RSA…

Hiding in Plain Sight: The Growth of Cybercrime in Social Media

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. Today, we are announcing the release…

The Financial Fraud Effect of Real-Time Payments

Several weeks ago, I published an article which provided a summary of the Australian Payments Council’s Australian Payments Plan.  This plan is designed as a strategic roadmap for the future of Australian payments, specifically the initiative around the New Payments Platform, or NPP.  In short, the NPP is going to introduce the ability to send funds in real-time via online banking as a…

Beyond the Login: Web Behavior Analytics Helps Retailers Stop Fraud

In a world of scammers, fraudsters and bad actors, there are two immutable rules thoroughly entrenched in the consciousness of IT professionals trying to stop them.  Rule 1: If there is something to monetize, cybercriminals will find it.  Rule 2: If you have a loophole or weak control on your website, cybercriminals will find it.…

The Role of Tor in Cybercrime

In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies (such as Tor) facilitate illegal, underground commerce.  This post aims to explain the underlying concept of how Tor functions, thus, how anonymity on the Internet is accomplished. An Overview of Tor and Internet Anonymity To understand how…

The Dark Web: Coming to a Retailer Near You

As retailers, financial institutions and payment processors around the globe prepare for the upcoming year, it should come as no surprise that cybercriminals in the Dark Web are doing the same. From the POS terminal to the mobile device, fraudsters are building their arsenal of cyber weapons to strike at every point along the way.…