In Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks are rising, but mobile operators have no plans to change the authentication required around number porting, which can be set in motion online with minimal personal information.
With the abundance of PII available on the dark web, there has been an explosion of synthetic identity fraud. Michael Lynch of InAuth discusses how device and user data can be leveraged to combat the fraudulent opening of new accounts.
Over the past year, financial services organizations have seen an 87% increase in credential leakage, 149% increase in stolen credit cards, 151% increase in cyber-attack indications, and a 48% increase in fake social media accounts. In addition, state-sponsored APT groups with little to no financial motivation have...
Cyber criminals are reaping the benefits of business email compromise and CEO fraud scams, which is a $12 billion industry, according to the FBI by impersonating an executive in your organization, asking for financial reports or by asking payroll staff to make changes to bank accounts.
Invoice and payroll fraud,...
Is your cloud still dripping important company data?
You're responsible for protecting the data you store in public cloud infrastructure. That may be obvious, but organizations continue to leave cloud data exposed. With so many ways to inadvertently expose your environment, maintaining secure configurations can be a...
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
A leading mobile-based financial services company sought out fraud prevention tools. In the past, fraudsters used that company's customer accounts to funnel money via stolen identities. But with advanced device fingerprint technology, the company could detect multiple accounts created from the same device and suspend...
Whenever a bad actor gains access to another party's legitimate account, this is called an Account Takeover (ATO). Not only are ATO attacks tough to spot, they can also cause a lot of harm beyond just stolen goods and chargebacks, including backlash from upset customers. In this guide, we dive into how these attacks...
A travel company that sells online undoubtedly encountered the flip side of enabling convenient and engaging features like last-minute bookings and streamlined checkout. Fraud and abuse threaten to run rampant.
If you mistakenly allow a bad actor to buy something, create a fake account, or compromise a good user's...
Restaurant reservation service OpenTable aims to create an amazing dining experience for its millions of users.
Sift Science enabled OpenTable to scale a highly successful digital gift cards program without increasing risk.
Read the case study to learn how to:
Limit manual review;
Move from a manual...
New York-based SeatGeek, a ticket search engine that enables customers worldwide to search for, find, and purchase tickets to countless events from multiple sources - all in one spot, was looking for a strategic and effective way to predict fraud trends while identifying legitimate users.
That is when they turned to...
Traveloka is one of the fastest growing tech companies in Southeast Asia that provides travel booking services for domestic and international destinations. Traveloka focuses on helping customers book flights and hotels quickly, easily, and economically.
Traveloka wanted a smart fraud solution that could reduce their...
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Canadian citizen Karim Baratov has been sentenced to serve five years in U.S. federal prison after he admitted to hacking and identity theft charges connected to his working as "hacker for hire" for alleged Russian FSB officers, who have been tied to a massive 2014 breach of Yahoo.
Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.