In the past 12 months, there's been a blistering series of high-impact attacks that increasingly blur the lines "between statecraft and criminal organizations," says CrowdStrike's Zeki Turedi. How much of this blurring is intentional?
Government regulation is key to minimizing the misuse of cryptocurrencies for cybercrime, says Brett Johnson, a former cybercriminal who now consults on crime prevention. But regulating cryptocurrencies is no easy task, he acknowledges. Johnson will keynote ISMG's Fraud and Breach Prevention Summit in Chicago.
The U.S. Department of Justice has charged a former CIA officer, 29-year-old Joshua A. Schulte, with providing 8,000 documents that describe the agency's offensive malware tools and practices to WikiLeaks, which published them in 2017 as the "Vault 7" archive.
As bitcoin continues its massive price fluctuations, a new report says criminals have continued their push to get extortion and ransom payments in more stable cryptocurrencies. But bitcoins remain a top target for hackers, who most often choose to directly target cryptocurrency exchanges.
It's likely not a matter of if, but when your company will fall
prey to targeted attack involving malware, ransomware, data
exfiltration, or phishing. In fact, 70% of organizations reported
a security incident that negatively impacted their business in
the past year. Learn more about the realities of...
South Korean cryptocurrency exchange Coinrail says hackers stole 30 percent of all of the cryptocurrency tokens it was storing, but many have been successfully frozen or recalled. Security experts say cryptocurrency exchanges remain poorly secured, so they're popular targets for hackers.
The era of the underground marketplace may be ending as concerns over law enforcement infiltration rise, says threat intelligence company Digital Shadows. Cybercriminals' deals are shifting toward encrypted chat and other decentralized services, the company says.
Restaurant reservation service OpenTable aims to create an amazing dining experience for its millions of users.
Sift Science enabled OpenTable to scale a highly successful digital gift cards program without increasing risk.
Read the case study to learn how to:
Limit manual review;
Move from a manual...
Financial institutions and their customers are no strangers to cyber threats, but attacks have evolved and have become specific to different types of organizations; banks, credit unions, insurance companies and private equity groups all face unique challenges. Threats exist from a range of actors including...
As customers spend more and more money online each year, the opportunities for fraud increase in parallel; experts project a loss of $24 billion to payment card fraud by the end of 2018. Payment card fraudsters rely on a sophisticated ecosystem and support network that provides a wide range of credit card details,...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
Two of Canada's biggest banks are investigating claims by "fraudsters" that they accessed their customers' data. At risk: 50,000 Bank of Montreal customers and 40,000 Simplii Financial customers. Both banks say they've alerted potentially affected customers and plan to cover any losses.
Calling Grant West "a one man cybercrime wave," a British judge sentenced him to serve more than 10 years in prison after he admitted to hacking into businesses, spoofing 100 organizations via phishing campaigns and earning profits in bitcoins from the sale of stolen personal details.
We surveyed more than 2,000 working adults - 1,000 in the US and 1,000 in the UK - about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently...
Anti-phishing training should be the foundation of any security awareness training program - but it's
critical to think beyond email (in more ways than one) in order to effectively strengthen end-user defenses.
Simulated phishing attacks - that is, email tests designed to mimic real-world social engineering attacks...