A phishing attack on Wednesday fueled by the Necurs botnet targeted at least 2,700 banking institutions of various sizes in the U.S. and around the world, explains Aaron Higbee of Cofense, which detected the attack.
Successfully committing Card Not Present (CNP) fraud hinges on the thief's ability to convince the merchant that they are, in fact, the legitimate card holder. But when it comes to shipping, a fraudster can't flat out lie about their location - because then they won't get their goods! There are tricks that these...
Merchants reviewing online orders for card not present (CNP) fraud often rely on strict rules-based systems to decline transactions based on "risky" indicators. Although these types of processes can help reduce chargebacks, they also lead to high false decline rates and a less-than-ideal shopping experience for...
According to a recent global fraud study, over 90% of eCommerce merchants use the same tools to manage fraud across both web and mobile transactions. While over 80% of merchants support mobile shopping, only 52% track fraud rates by channel.
As mCommerce becomes more prominent, neglecting to adjust fraud management...
The 2018 State of the Phish Report presents analysis of data that can help CISO's and their teams identify opportunities to manage end-user risk. The report delivers the types of data infosec professionals are seeking as they develop their own security awareness training programs.
Download this report to learn more...
A cryptocurrency investor is suing AT&T for $240 million, alleging he lost $24 million in virtual currency after the carrier failed to stop two separate attacks where his phone number was commandeered by attackers. The incident highlights the dangers of using a phone number as an authentication channel.
Machine data is one of the most underused and undervalued assets of any organization, yet it contains powerful business and operational insights that can help you quickly diagnose service problems, detect advanced security threats and uncover the fingerprints of fraud.
Download this e-book and learn:
Where you...
The Cobalt cybercrime group is targeting as many banks as possible, which poses risks particularly for smaller, less protected institutions, says Tim Bobak, APAC executive director for Group-IB.
Cybercrime investigators will face increasing difficulties if bad actors begin accepting more privacy-centric cryptocurrencies rather than bitcoin, says Andrei Barysevich of Recorded Future.
Deterring nation-states such as Russia and North Korea from executing cyberattacks will require sanctions and other pressure, says Fergus Hanson of the Australian Strategic Policy Institute.
Almost 6 million Americans had their patient records stolen or exposed in healthcare breaches over the past year with ransomware being a frequent and highly effective form of attack. Recent successful variants such as SamSam and Ryuk have caused an estimated $7 million in damages alone.
Clearly, ransomware is a...
The FBI warns that cybercriminals are planning a large-scale operation aimed at emptying ATMs, a type of attack that has caused swift and costly losses for financial institutions. The attack may utilize data from a breach of an unknown card issuer, the FBI says.
Protecting customers and company resources in the cloud is a constant struggle and balancing act. Fraudsters are aided by new techniques and technologies while unknowing customers support their efforts. In this session, fraud prevention experts from Amazon Web Services will outline the compromise problem and discuss...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.