A cryptocurrency investor is suing AT&T for $240 million, alleging he lost $24 million in virtual currency after the carrier failed to stop two separate attacks where his phone number was commandeered by attackers. The incident highlights the dangers of using a phone number as an authentication channel.
Check Point says it has found three ways to falsify messages in WhatsApp, which it claims could be employed by scammers and used to spread fake news. WhatsApp acknowledges the findings, but it will not engineer patches.
Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns.
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
Known losses due to business email compromise have exceeded $12.5 billion worldwide, the FBI's Internet Complaint Center reports, adding that fraudsters are increasingly targeting the U.S. real estate sector with such scams.
It's a fair question: Can you trust the fraud advice you're given from a former fraudster? Especially one who's betrayed law enforcement before? Brett Johnson says he's abandoned crime for good, and he shares insight on the types of fraud schemes he once practiced.
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Restaurant reservation service OpenTable aims to create an amazing dining experience for its millions of users.
Sift Science enabled OpenTable to scale a highly successful digital gift cards program without increasing risk.
Read the case study to learn how to:
Limit manual review;
Move from a manual...
This report uses healthcare-specific data to explore how medical staff and other end users in this industry are performing on cybersecurity assessments. We analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of...
A group of cybercriminals known for their persistence and precision in executing attacks against banks' ATMs and card processing infrastructures has regrouped despite the arrest of their alleged leader.
Facebook has taken several moves aimed at minimizing misuse of social media during the 2019 elections in India. But are the actions merely a marketing maneuver, or could they have a real impact?
Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.
Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.
User-generated content is the lifeblood of online marketplaces and communities -- but content abuse is equally powerful. More than ever, fraudulent content is eroding the digital trust between business and users.
How can you protect your customers and your bottom line from fraudsters?
Download this whitepaper to...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.