- German researchers hack Galaxy S5 fingerprint login
- JP Morgan to invest £150 million on boosting cyber security
- Today's Approach to Security is Broken
- Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
- Symantec draws new security picture
Smaller financial institutions have been warned to look out for attacks that aim to increase the withdrawal limit on customer payment cards for fraud purposes.
Security vendor Trustwave was accused in a class-action suit of failing to detect the attack that led to Target's data breach, one of the largest on record.
A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets.
A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATM -- by text message.
Russian-Morrocan hacker Farid Essebar, known online as Diabl0, was arrested in Bangkok at the request of law enforcement authorities from Switzerland who want him extradited to face charges in connection with computer fraud offenses and credit card information theft.
So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
E-commerce fraud costs retailers approximately $4 billion each year, according to the most recent results of an annual survey conducted by Cybersource, a provider of electronic payment and risk management services. Sebbe Jones, manager of fraud and disputes at 2Checkout, is in the business of keeping e-commerce fraud at bay.
Bernard Madoff, Allen Stanford and California money manager Danny Pang may be the latest examples of outrageous fraud. But what about the little guys? The administrator, middle manager or call-center rep?
Cybercriminals are improving a malicious software program that can be installed on ATMs running Microsoft's Windows XP operating system that records sensitive card details, according to security vendor Trustwave.
Whitepapers about fraud
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Sign up now »
Ultimate protection for your small or medium-sized business
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.