Fraud is scary, and there are many valid reasons for retail merchants to decline suspicious transactions in the name of fraud prevention. But often, in the quest to avoid abuse, risk-averse vendors take defensive measures too far. According to industry data, the average merchant loses 5.5% of their revenue to false...
Check Point Research has spotlighted attacks against several embassies that show how subtle changes in source code can alter how security professionals can detect and stop different types of malware.
The latest edition of the ISMG Security Report describes how a Facebook Marketplace glitch created serious privacy issues. Plus: An update on the activities of the FBI's Recovery Asset Team and HSBC whistleblower Everett Stern's preview of keynote address at upcoming ISMG Fraud and Breach Summit in Chicago.
There's good news and there's bad news.
The financial services industry gets phished more than most. How well do banks and other institutions defend themselves? In some respects quite well, but no one should be complacent.
Download this industry brief and learn:
How FinServ maintains an above-average resiliency to...
Organizations need full visibility into sanctioned and unsanctioned cloud activity, app and vendor details, usage trends, and risk profiles to enable cloud adoption in a secure and organized fashion. Once you understand the landscape, then you can start to make decisions and manage usage.
Download this eBook and...
TA505, a sophisticated advanced persistent threat group, is now using legitimately signed certificates to disguise malware that can penetrate banking networks, security researchers warn in a new report.
The director of Britain's GCHQ intelligence agency said at this week's CyberUK conference that declassifying and putting "time-critical, secret information" for stopping online threats into the public's hands "in a matter of seconds" is an imperative.
The 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Download the...
If you're an infosec leader, you're charged with a complex mission:
effectively mitigate cybersecurity risks to your organization within the constraints of finite resources. In many cases, you strain those resources in ways that undermine your ability to continuously improve your organization's broader security...
Asset management - it's not the most exciting thing in the world. In an industry with technologies like automation, machine learning, and AI, asset management doesn't get a whole lot of attention, but it's foundational and one of the biggest problems organizations face today.
Security teams' jobs continue to get...
A sophisticated supply-chain attack dubbed Operation ShadowHammer is becoming more pervasive, with the group targeting online gamers, security researchers at Kaspersky Lab warn.
For the first time, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public appearance to discuss how they collaborate, sharing a stage in Glasgow, Scotland, during the CyberUK conference. The Five Eyes alliance comprises Australia, Canada, New Zealand, the U.K. and U.S.
Everett Stern, the whistleblower who called attention to HSBC's international money laundering activities, which ultimately resulted in a $1.9 billion fine, says the crackdown on financial fraud still has a long way to go. He'll be the keynoter at ISMG's Fraud and Breach Summit in Chicago on May 14.
By 2020, 75% of omni-channel customer-facing organizations will sustain a targeted, cross-channel fraud attack with the contact center as the primary point of compromise.*
Read "Don't Let the Contact Center Be Your Fraud Achilles Heel" to learn why Gartner believes the technologies and techniques available to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.