- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Web proxy app becomes Bitcoin mining trojan
- Week in review: Great Bitcoin Robbery highlights shopping-season security risks
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
The co-founder of Liberty Reserve, a now defunct virtual currency that was widely favored by the criminal underground, pleaded guilty on Thursday to money laundering and other charges.
Six Eastern European men are being sought by U.S. prosecutors for allegedly netting up to US$3 million by placing fraudulent advertisements for vehicles, motorcycles and boats on major online marketplaces, including eBay.
Insiders are still the main threat to an organisation’s information, but outside hackers have caught up and are leaning on vendors and suppliers to gain a foothold in their targets.
So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
E-commerce fraud costs retailers approximately $4 billion each year, according to the most recent results of an annual survey conducted by Cybersource, a provider of electronic payment and risk management services. Sebbe Jones, manager of fraud and disputes at 2Checkout, is in the business of keeping e-commerce fraud at bay.
Bernard Madoff, Allen Stanford and California money manager Danny Pang may be the latest examples of outrageous fraud. But what about the little guys? The administrator, middle manager or call-center rep?
Cybercriminals are improving a malicious software program that can be installed on ATMs running Microsoft's Windows XP operating system that records sensitive card details, according to security vendor Trustwave.
Whitepapers about fraud
Cunningham Lindsey, a leading claims management company that specializes in fraud, not only uncovered an organized fraud ring but also established an efficient process for helping their insurance customers identify legitimate claims from the fraudulent ones. In this case study, find out how possible fraudulent claims were flagged, leading to the discovery of a criminal fraud.
Sign up now »
Think your endpoints are secure? Think again. Learn why Trend Micro can help.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.