The Security Service of Ukraine this week arrested a hacker known as "Sanix" who allegedly sold combinations of millions of email passwords and usernames on darknet forums.
$4 Billion dollars of fraudulent activity is coming through the phone channel. This webinar discusses the rise of fraud in the IVR and how the IVR has become a new vector of choice for fraudsters.
Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.
How is fraud likely to evolve as a result of the COVID-19 pandemic, which has led to the growth of telework and ecommerce? Gary Shiffman, CEO of Giant Oak, discusses emerging trends.
NHS England not only manages the standards for healthcare services in England, but the way it operates is seen as hugely influential. Mobility is central to the way NHS England works: almost all its 7,500 staff work from mobile devices. Staff checks emails, shares reports and key documentation internally and with...
There is a common belief that implementing a Unified Endpoint Management (UEM) solution, or its predecessor, a Mobile Device Management (MDM) solution, with a mobile container provides solid protection for enterprise data. This is a misconception. Companies that build their mobile security strategy by relying solely...
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Emotions about the global pandemic are running high, and attackers are taking advantage. Researchers have observed criminals spreading malware by impersonating official sources, distributing malicious COVID-19 maps and trackers, and malvertising on coronavirus-related news stories.
As security professionals, we...
If you conduct business online, provide your customers and partners with secure web-access to your systems, or just have a brand worth spoofing, it is very likely your brand is already being exploited via email or the web. This attack technique has gone well beyond the big internet brands like Microsoft, ebay, and...
The FBI this week seized the domain of Deer.io, which federal authorities describe as a clearinghouse for stolen data and cybercriminal services operating from Russia. The alleged administrator of the now-shuttered site has been arrested and charged.
Identity risk management. It's more important
than ever. Traditional businesses are taking their
operations fully digital, and newer all-digital
businesses are growing. Both groups need to
onboard new users to their services remotely.
But they also need to monitor the risks to their
platform as their user base...
Payment card data stolen last year when hackers compromised online stores that were using the Volusion checkout platform is now surfacing on dark web sites and forums, according to Gemini Advisory.
Account Takeover is now a ubiquitous term, and ATO prevention has become a high priority for cybersecurity leaders. But most of the effort is put toward thwarting high-volume, automated credential stuffing. Less understood are "targeted ATO attacks." Highly effective and difficult to detect, they cause huge damage to...
A former acting inspector general of the Department of Homeland Security and another official have been indicted for allegedly stealing DHS proprietary software and databases and then attempting to resell the technology back to the government.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.