Fraud

Cybercrime in Social Media Grows 70% in Six Months

These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of fraud activity occurring in plain sight.  As reported earlier this year by RSA, social media has become a breeding ground for cybercrime-related…

2017 Global Fraud and Cybercrime Forecast

From mobile threats and malware, to the organizations on the target lists of e-commerce fraud – a myriad of threats exist across the cyber landscape and the commoditization of cybercrime is making it easier and cheaper to launch attacks on a global scale.  If you are a believer that the best predictor of future events…

PSD2 and the E-Commerce Ecosystem

Authored by Ian Newns The European Banking Authority recently drafted the latest Directive on Payment Services II (PSD2), which serves as the legal foundation for a cross-EU payments market.  In 2016, European e-commerce sales are expected to increase 17% to €183 billion and the use of payment service providers (PSPs) is increasing significantly. Couple this with…

Recognizing and Combating Cybercrime: A Virtual Chat

The goal of cybercrime doesn’t change, but the tactics do.  This week’s theme for National Cyber Security Awareness Month is Recognizing and Combating Cybercrime.  One of the questions to be addressed is: What are cybercriminals looking to gain from attacks? With the impact of cybercrime costing the global economy about $445 billion in 2016, which is more than the market…

New Research Reveals: Phishers Launch a New Attack Every 30 Seconds

As long as users can be fooled, phishing will continue to proliferate.  In fact, many major breaches start as a targeted phishing email.  According to the latest statistics from RSA FraudAction researchers, more than one million unique attacks have been identified in the last 12 months, or, more simply put, a new phishing attack is launched every 30…

The Most Important Visitor On Our Premises

A customer is the most important visitor on our premises, he is not dependent on us. We are dependent on him. He is not an interruption in our work. He is the purpose of it. He is not an outsider in our business. He is part of it. We are not doing him a favor…

POS Malware and Other Hacks Plague the Hospitality Industry

The days of making “analog accommodations” at hotels — filling out a reservation slip, taking ownership of a door key and having only a telephone handset to communicate with the outside world— are long over. Today’s hotels are rife with digital trapdoors, metaphorical sinkholes that have the capacity to compromise your personal information and identity.…

The Era of Proportional Ransomware Has Arrived

According to the FBI the incursion of ransomware has just gone from bad to worse. In a recent alert, the U.S. Federal Bureau of Investigation (FBI) warned that recent ransomware variants have targeted and compromised vulnerable business servers to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. More…

Credential Checking Services Soar in Popularity on Dark Web

If you’ve ever needed another reason to not recycle your passwords, I give you Sentry MBA. Although the tool has been around for a couple of years, it has recently been soaring in popularity among those in the fraud community which is no surprise with more than 1.5 billion consumer credentials breached so far this year. The…

Your Step-Up Authentication Compass… NIST & SMS – Finding North

An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around…