Fraud

Fraud | News, how-tos, features, reviews, and videos

financ credit pos
credit card hack financial breach stealing money traffiking financial data target by igphotography

6 handling email phishing

Business email compromise: The odds of being a victim are increasing

Given the growth over the last few years in BEC and EAC fraud, businesses should educate employees about the risks involved and red flags of this activity.

CSO  >  Adware  >  Browser windwows containing malicous code

What is adware? How it works and how to protect against it

Adware is deceptive software that earns its creators money through fraudulent user clicks. Fortunately, it's one of the the most detectable types of malware.

hacker linkedin scam romance scam on social media phishing heart

How to stick it to LinkedIn romance scammers

LinkedIn is becoming a popular channel for criminals to find victims for romance scams. Here's how to identify, report and block those scammers.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

security firewall breach hacker privacy battle id work getty

How to spot a scam: 14 red flags to watch for

Does your security awareness training program help your employees learn when someone is trying to scam them?

tip of the iceberg data breach hacked cyber security

Why reported breaches are the tip of the iceberg

Thousands of businesses are breached every day without them even knowing it, compromising payment card data. The EMV chip isn’t the solution, but data devaluation can reduce the impact.

Hands write on paper with pen.

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations.

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

mobile purchase transaction

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

phishing fishing lure bait binary hack security breach

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

abstract networks and connections

Review: Senzing uncovers relationships hiding within big data

Used to combat fraud or uncover accidental data duplication, Senzing is a powerful yet lightweight tool with an artificial intelligence that is actually extremely smart.

A traveller with suitcase looks at the horizon and the path ahead. / travel / adventure / beginnings

What the digital booking trend means for local travel attractions and fraud prevention

Online bookings of local tours, attractions and even dining have skyrocketed. Although this can be a great source of traffic and revenue for these local attractions, online payments fraud in this sector continues to rise and these...

stolen credit card

In the new ecommerce fraud landscape, every vertical is now at risk

Fraudsters are not just targeting small merchants or inexpensive items anymore – virtually any vertical or product can be a worthwhile target for online fraud, and the losses could cause irreversible damage to a retailer’s bottom...

7 safe browswer search legitimate url domains surfing the internet

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

security threats and vulnerabilities

What price range sees the most CNP fraud? It depends

Data on the price ranges that online fraudsters target most are effective in helping retailers be more aware of fraud tendencies. However, any price point can be a target to some criminals, and it’s important to leverage this data to...

fingerprint scan biometric security system

N-dimensional behavioral biometrics: a viable solution for digital fraud?

Artificial intelligence can be used to stop identity fraud from reaching record-breaking highs.

Load More