Fraud Prevention

Fraud Prevention news, information, and how-to advice

stack of credit cards in isolated white 000001679406
moviesec

Fraud definition

Sleeping companies lose big from employee, executive fraud

Companies that fail to continually watch for employee and executive fraud typically lose 5 percent of revenues each year to insider cunning, which amounts to nearly $3.7 trillion globally, a report found...

credit cards generic

Retailers plodding toward accepting higher-security payment cards

Target is speeding up support for chip-and-PIN payment cards to restore consumer confidence shaken by last year's massive data breach. But many other retailers feel less of an urgency to adopt the more secure technology....

The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

New BitCrypt ransomware variant distributed by bitcoin stealing malware

Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied...

Hacker Diabl0 arrested in Thailand at the request of Swiss authorities

He is wanted in connection with computer fraud and credit card information theft in Switzerland...

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on...

20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade....

Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says

Recently leaked Mt. Gox data archive contains a malicious application that steals Bitcoin wallet files, a researcher from Kaspersky Lab said...

Source code for Android iBanking bot surfaces on underground forum

The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said...

Energy sector a prime target for cyber attacks

Experts say the nation's critical infrastructure remains woefully vulnerable...

Cybercriminals compromise home routers to attack online banking users

Attackers changed the DNS configuration of vulnerable home routers to mount man-in-the-middle attacks against users in Poland...

Building control systems can be pathway to Target-like attack

Credentials stolen from automation and control providers were used in Target hack...

Suspected data breach at Holiday Inn, Marriott hotels

A large hotel management company says attackers may have compromised its point-of-sale devices...

Arts and crafts chain Michaels investigates possible data breach

The company has not confirmed a compromise but is notifying customers in advance...

Neiman Marcus says malware defeated its security

The retailer's CIO writes that the company exceeded security recommendations for handling card data...

The 8 most significant ways physical security has evolved

From RFID badges to facial recognition, physical security has changed quite a bit over the years. We walk you through the most significant changes we've seen so far...

Two coders closely tied to Target-related malware, security firm says

Underground forum postings indicate both may have used the same online nickname, according to IntelCrawler...

Officials: Two people used fake credit cards that may be linked to Target data breach

Police didn't say if the pair were directly involved in the data breach or merely purchased stolen card information...

Load More