Account takeover is a rapidly growing arena for cybercriminals. How can organizations strengthen both authentication and authorization? Scott Olson of iovation, a TransUnion Company shares his insights.
Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says Aseem Ahmed of Akamai Technologies, who shares best practices for mitigating the threats.
Thousands of emails from four senior aides within the National Republican Congressional Committee were exposed after their accounts were compromised for several months earlier this year, Politico reports. Few details have been released about the incident, which was investigated by Crowdstrike.
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
For security professionals, learning about the details of individual attacks is key to understanding the impact to their own environment. And that is exactly what this new report provides.
Download the 2018 State of the Internet / Security Report and learn from 12 months of stories drawing on key attacks such...
Dell and Dunkin Donuts have both initiated password resets after experiencing separate security incidents aimed at gaining access to customer accounts. The impacts of the attacks, however, appear to be limited.
A database security blunder revealed on Friday serves as a reminder that the days of SMS-based authentication should be over. The exposed database, which wasn't protected by a password, contained 26 million text messages, many of which were two-step verification codes and account-reset links.
The notorious Romanian hacker known as Guccifer, who revealed the existence of Hillary Clinton's private email server and admitted to hacking numerous email and social media accounts, has been extradited from Romania to begin serving his 52-month U.S. prison sentence.
In this report, we provide an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. We analyze vulnerability prevalence in the wild,
based on the number of affected enterprises, to highlight vulnerabilities that security practitioners...
While organizations have taken countless measures to strengthen the security of their online resources, criminals have begun to eye a far more appealing and lucrative target: the contact center. It's what Gartner calls "an epicenter of vulnerability."
From hard-dollar losses and added overhead to combat the...
To deliver a better, frictionless experience, organizations should consider real-time, multilayered, omnichannel identity trust assessments that analyze a wide variety of intelligence - including network, device, environment, behavioral and global intelligence.
Download this white paper and learn about:
HSBC Bank is warning some of its U.S. customers that their personal data was compromised in a breach, although it says it's detected no signs of fraud following the "unauthorized entry." Security experts say the heist has all the hallmarks of a credential-stuffing attack campaign.
Australian police have charged a woman in the theft of AU$450,000 (US$318,000) worth of the virtual currency XRP, also known as Ripple, in one of the largest cryptocurrency thefts from a single victim. The case highlights how basic security messaging on protecting cryptocurrency isn't getting through.
3D Secure 2.0 is expected to have a profound impact on the payments industry by accelerating digital commerce and offering a better user experience with increased fraud protection for card-not-present transactions. Yet, issuers, payment processors, and merchants continue to struggle with many questions on the road to...