A group of cybercriminals known for their persistence and precision in executing attacks against banks' ATMs and card processing infrastructures has regrouped despite the arrest of their alleged leader.
Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter.
Download this report to learn more about:
What the scope and cost of an attack is in various industries;
How organizations are protecting themselves in various industries from...
User-generated content is the lifeblood of online marketplaces and communities -- but content abuse is equally powerful. More than ever, fraudulent content is eroding the digital trust between business and users.
How can you protect your customers and your bottom line from fraudsters?
Download this whitepaper to...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
Account take-over (ATO) happens on some of the most major social networks and to really well-known celebrities, so if it can happen to them, it can happen to you and your organization. When people use insecure passwords that are easy to crack, hackers are able to gain access to the victim's account and change the...
Attackers rarely bother with technical sophistication when easy social engineering schemes, such as "hacking" a victim's social network and using it against them, can give them what they want, says Markus Jakobsson, chief scientist at the cybersecurity firm Agari.
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.
In spite of all the news about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering.
Successful hackers know the user is the weakest link in the security chain. Email phishing campaigns have proven to be...
According to a recent report, The Identity Fraud Study, released by Javelin Strategy & Research, it showed in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping...