Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says Aseem Ahmed of Akamai Technologies, who shares best practices for mitigating the threats.
Thousands of emails from four senior aides within the National Republican Congressional Committee were exposed after their accounts were compromised for several months earlier this year, Politico reports. Few details have been released about the incident, which was investigated by Crowdstrike.
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
For security professionals, learning about the details of individual attacks is key to understanding the impact to their own environment. And that is exactly what this new report provides.
Download the 2018 State of the Internet / Security Report and learn from 12 months of stories drawing on key attacks such...
Dell and Dunkin Donuts have both initiated password resets after experiencing separate security incidents aimed at gaining access to customer accounts. The impacts of the attacks, however, appear to be limited.
Identity theft is the fastest growing
crime in the US. Globally, 1 in 60
online transactions are fraudulent.
That presents a huge financial
and reputational risk for regulated
businesses if they get their KYC
wrong. As more services move
online and fraud techniques mature,
document and biometric...
Identity risk management: it's more important
than ever. Traditional businesses are taking their
operations fully digital, and newer all-digital
businesses are growing. Both groups need to
onboard new users to their services remotely.
But they also need to monitor the risks to their
platform as their user base...
Identity fraud cost the United States $16.8 billion in 2017. For Financial Services, the issue is acute. Thanks to a recent spate of data breaches, SSNs and other traditional identifiers are no longer fit for purpose. But without identity verification, new customers can't be onboarded.
Increasingly strict KYC and...
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming.
This guide is a comprehensive series of...
The financial services industry is in the midst of sweeping change. Earlier this year, we saw one of the latest shifts with the introduction of the European Union's revised Payment Services Directive (PSD2). PSD2's Strong Customer Authentication (SCA) section requires two factors for authentication.
While the modern organization embraces digital technology, it is also at risk of cyberattacks. In this guide, The Essential Guide to Security, we map out how agencies can use machine data for specific use cases and get started addressing threats and security challenges.
While the modern enterprise embraces digital...
A database security blunder revealed on Friday serves as a reminder that the days of SMS-based authentication should be over. The exposed database, which wasn't protected by a password, contained 26 million text messages, many of which were two-step verification codes and account-reset links.
The notorious Romanian hacker known as Guccifer, who revealed the existence of Hillary Clinton's private email server and admitted to hacking numerous email and social media accounts, has been extradited from Romania to begin serving his 52-month U.S. prison sentence.
In this report, we provide an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. We analyze vulnerability prevalence in the wild,
based on the number of affected enterprises, to highlight vulnerabilities that security practitioners...
When it comes to bots, evolution is the name of the game. Nefarious bots are one of the fastest growing and fluid threats facing cyber security experts today. In fact, the information in the eBook may be out of date by the time you even read it - that is how dramatic the evolution is.
So, does that mean that you...