Fraud | News, how-tos, features, reviews, and videos

fishing phishing survival competition different point of view
Japan Asia digital payment retail commerce tap


Stolen ChatGPT premium accounts up for sale on the dark web

There has been an increase in discussions and trades related to ChatGPT on the dark web since March, according to Check Point.

cso security hacker breach gettyimages 1134588944 by jossnatu 2400x1600px

BEC groups are using Google Translate to target high value victims

The threat actors extensively research their target’s responsibilities and relationship with the CEO and create spoofed email accounts that look like real ones.

cyber investigation justice

US DOJ applies carrot-and-stick approach to Foreign Corrupt Practices Act policy

Corporations (and their CISOs) that discover wrongdoing or corruption within their own business are well-advised to self-report such activities and cooperate with prosecutors. The stakes are high for those who don’t.

money currency international denominations global currency by metamorworks getty images 1129515470

P-to-P fraud most concerning cyber threat in 2023: CSI

Peer-to-peer fraud and other digital fraud constituted more than 29% of bankers categorizing it as the most worrying cyber threat in 2023, according to CSI.

A network of security components overlays a credit card payment made by laptop user.

PCI Secure Software Standard version 1.2 sets out new payment security requirements

Changes include the Web Software Module to help payment software vendors and developers identify and implement security controls to protect against attacks.

malicious email with skull and crossbones

Website offering spoofing services taken offline after joint operation

Law enforcement authorities in Europe, Australia and North America have arrested 142 people in connection with a website that allowed criminals to steal $120 million from victims that had fallen foul of spoofing campaigns.

Bitcoin symbol on the ground surrounded by crime scene tape and forensic evidence markers.

Blockchain security companies tackle cryptocurrency theft, ransom tracing

Cybercrime that involves cryptocurrency is at an all-time high, and some security companies hope to help prevent it.

CSO: Have you met these hackers? [slide 01]

Financial losses to synthetic identity-based fraud to double by 2024

Made-up financial identities will cause losses of nearly $2.5 billion, thanks to the prevalence of imposter scams.

cybercrime / police line / crime scene / investigation

True crime shows might be the biggest educational tool for cybercrime awareness

Popular cultural depictions of fraud and cybercrime are raising awareness of the dangers posed to personally identifiable information by bad actors, according to a new study.

Dustin White, chief risk data officer, Visa

How Visa fights fraud

The financial services company has made massive investments in data and analytics to better detect and prevent fraud.

A frowning, anxious woman looks at her phone in shock and horror.

The security user experience (SUX)

Security processes that treat the very users we protect as unwanted burdens and alienate them in the process are a path to failure.

phishing fishing lure bait binary hack security breach

What is spear phishing? Examples, tactics, and techniques

Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.

A network of security components overlays a credit card payment made by laptop user.

New PCI DSS v4.0 receives kudos for flexibility

Customization, multi-factor authentication are key features in PCI DSS v4.0 global payment benchmark.

iPhone counterfeiting case highlights risks of supply/support chain manipulation

The conspirators returned fake iPhones with legitimate IMEI numbers to Apple for warranty replacements, which they then sold. Key unanswered question: Did an insider provide the IMEI numbers?

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Why buy now, pay later is the next big fraud risk for retailers

BNPL is booming, catching the eye of fraudsters who seek to exploit the BNPL process for malicious gain. Here is an overview of the risks BNPL fraud poses with strategies for mitigating threats.

The shadow of hand unsettlingly hovers over a keyboard.

FBI arrests social engineer who allegedly stole unpublished manuscripts from authors

The U.S. Department of Justice claims Filippo Bernardini leveraged knowledge gained by working at Simon & Schuster and other publishers to create fake identities and websites to steal intellectual property.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

Security lessons from 2021 holiday shopping fraud schemes

Here are four ways fraudsters targeted the 2021 shopping period with insight into how retailers can prevent and defend against exploitation.

Load More
You Might Also Like