The rollout of EMV in the U.S. has transformed the card fraud landscape, with a major shift to online channels, says Shamoun Siddiqui, CISO at retailer Neiman Marcus.
99% of account takeover attacks begin with automation, and they pave the way for future ATO. Today's sophisticated scripts can bypass traditional measures that rely purely on device intelligence or static data. Learn how to block sophisticated attacks with behavioral biometrics before they create fraud losses.
You...
Payments are getting faster, and so is payments fraud. A robust fraud management strategy focusing on strong authentication, customer education and scalable responses can be instrumental in minimizing payment fraud risk.
A remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a large scale for mining the virtual currency monero, a researcher says. At least 400 websites have been infected, and the total number is likely far higher, security experts warn.
You know that you've got a problem to solve but how will you address it? More importantly, who will help you address it? This is the crux of the build versus buy debate that companies are currently having with themselves.
While building and buying both have their merits, they also have costs which should be...
Business email compromise and account takeover attacks haven't faded; they've just morphed. Wes Dobry of Agari discusses the new wave of these attacks and how organizations can do a better job of detecting and responding to them.
Brett Johnson was a career fraudster - he stole millions from victims by pioneering a plethora of cyber fraud schemes. Aaron Sherman is a career law enforcement agent - most recently operating as a cyber special agent with the FBI. Together, they offer a two-pronged look at some of today's top cybercrimes - how they...
Maintaining strong payments security practices is a continuously moving target given the ever-evolving payments ecosystem and dynamic nature of the threat environment. The commitment to improve security is a priority throughout the payments industry as evidenced by the ongoing collaboration across these issues. This...
Accidentally careless employees are the biggest cause of incidents involving data loss, responsible for almost 25 percent of all breaches.
Given that employees are the first line of defense against socially engineered schemes, such as account takeover, new account fraud and other crimes, doesn't it make sense to...
Attackers rarely bother with technical sophistication when easy social engineering schemes, such as "hacking" a victim's social network and using it against them, can give them what they want, says Markus Jakobsson, chief scientist at the cybersecurity firm Agari.
Payments technology changes rapidly, and cybercriminal techniques are having no trouble keeping pace. As the use of stolen data and fraudulent cards become more difficult, criminals are shifting their focus and innovating to access customer payment transaction data. The risk of data theft is very real. To stay ahead,...
As payment card fraud schemes continue to evolve, the PCI Security Standards Council has to recalibrate its standards and programs, says Troy Leach, the council's CTO, who describes three key updates.
The recent data breach impacting 150 million user accounts of Under Armour's MyFitnessPal application and website offers important lessons for mobile app developers, security expert Joan Pepin explains in this interview.
In spite of all the news about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering.
Successful hackers know the user is the weakest link in the security chain. Email phishing campaigns have proven to be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.