HackDig : Dig high-quality web security articles for hacker

Report: Organizations remain vulnerable to increasing insider threats

The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts. Nor was it special because the hack was the result of a vulnerable firewall misconfiguration. Many still talk about this breach because a leak of this magnitude,
Publish At:2019-12-05 16:50 | Read:119 | Comments:0 | Tags:Awareness Carnegie Mellon University cert insider threat cen

Cyberthreats to financial institutions 2020: Overview and predictions

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Corporate security prediction 2020 Key events 2019 Large-scale anti-fraud bypass: Genesis digital fingerprints market uncovered Multi-factor authentication (MFA) and biometric challenges
Publish At:2019-12-03 06:05 | Read:287 | Comments:0 | Tags:Kaspersky Security Bulletin ATM Biometric authentication Cre

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

In 2018, the video game industry became one of the most lucrative in the world, generating $43.4 billion in revenue within the United States alone. When we consider that video game licenses are only a fraction of the total market, it becomes clear just how important the industry is compared to the movie and music industries, for example. Moreover, conservati
Publish At:2019-11-12 01:05 | Read:206 | Comments:0 | Tags:Featured Publications Electronic Payments Fraud Online Games

A week in security (October 28 – November 3)

Last week on Malwarebytes Labs, we celebrated the birth of the Internet 50 years ago, highlighted reports about the US Federal Trade Commission (FTC) filing a case against stalkerware developer Retina-X, issued a PSI on disaster donation scams, looked at the top cybersecurity challenged SMBs face, and provided guidance to journalists on how they can defend t
Publish At:2019-11-11 23:20 | Read:173 | Comments:0 | Tags:A week in security Adobe Creative Cloud advanced persistent

Steam-powered scammers

Digital game distribution services have not only simplified the sale of games themselves, but provided developers with additional monetization levers. For example, in-game items, such as skins, equipment, and other character-enhancing elements as well as those that help one show up, can be sold for real money. Users themselves can also sell items to each oth
Publish At:2019-10-28 06:05 | Read:273 | Comments:0 | Tags:Featured Research Fraud gam Phishing websites Social Enginee

How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept. To do business online, whether you are a bank, retailer, insurer, airline or anything else, you must have some degree of trust in your user — trust
Publish At:2019-10-18 10:20 | Read:210 | Comments:0 | Tags:Fraud Protection Identity & Access Access Governance digital

#FacebookLockout: Users who report fake/scam accounts locked out

byLisa VaasPeople who are just trying to be good citizens of Facebookland, by reporting fake accounts set up by, say, a scammer pretending to be their dead granny, are being locked out of their own accounts by what looks like a glitch in Facebook’s reporting function.Users frustrated at the lockouts had taken to Twitter to get Facebook’s attentio
Publish At:2019-10-16 05:50 | Read:237 | Comments:0 | Tags:Facebook Social networks #FacebookLockout account impersonat

Europol: Ransomware remains top threat in IOCTA report

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren’t surprised to find that ransomware, despite its palpable decline in volume these past few months—a trend we’ve also seen and documented—remains the most prominent threat in terms
Publish At:2019-10-14 23:20 | Read:260 | Comments:0 | Tags:Awareness bec Business Email Compromise child sexual exploit

Open Banking Is Here — Is Your Bank Positioned to Lead?

Banking is set to significantly change as Payment System Directive 2 (PSD2) regulations are introduced across Europe. In fact, open banking regulations are being considered in a number of regions around the world. The directives will require financial institutions to adopt open banking by safely and securely allowing customers to view account information and
Publish At:2017-11-01 18:45 | Read:4680 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Risk Managemen

Don’t Be Catfished: Protecting Yourself From New Account Fraud

Catfishing, the practice of pretending to be someone else online, became a cultural phenomenon through MTV’s popular TV show “Catfish,” driving more attention to our obsession with our online personas. However, it’s not just social media that needs additional scrutiny. In the wake of several recent major data breaches of personally id
Publish At:2017-11-01 00:20 | Read:2398 | Comments:0 | Tags:Fraud Protection Identity & Access Fraud Fraud Detection Fra

Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud — What’s Next?

Financial online fraud and the fuel that feeds it has been growing steadily over the past decade, resulting in losses to banks, businesses and individuals, especially with cases of new account fraud (NAF). The challenge online service providers face nowadays is not only an increase in NAF, but also in NAF’s sophistication and the difficulty to detect
Publish At:2017-10-31 05:50 | Read:2933 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Identity & Acc

Grandma or the Wolf? Red Gets Smart About Fraud Protection

Little Red Riding Hood is stressed out. A job in fraud protection is no picnic — far from it. As the digital banking fraud manager for Fairy Tale Bank, she’s constantly assessing her customers to make sure no fraudulent activity is occurring. After all, fraud is no myth — it’s as real as can be. If Red has her way, her customers will stay safe al
Publish At:2017-10-23 17:50 | Read:2168 | Comments:0 | Tags:Fraud Protection Topics Fairy Tales Fraud Fraud Detection Fr

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Have you ever unknowingly opened and responded to a phishing email or fallen victim to a phishing attack? A recent report by Frost & Sullivan titled “You’ve Been Phished, Again! Solution: Eliminate the Click-It Temptation,” discussed just how susceptible we all are to these fraudulent attacks and what can be done to avoid them. How Do P
Publish At:2017-09-12 13:50 | Read:2925 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Cognitive Secu

Brazilian Malware Client Maximus: Maximizing the Mayhem

In January 2017, IBM X-Force research reported the development of a new remote-access malware code targeting Brazilian banks. The malware, dubbed Client Maximus, was observed in ongoing campaigns and continues to target online banking users in the country. The development of Client Maximus, which is believed to be commercially available in Brazilian fraud an
Publish At:2017-09-12 13:50 | Read:3144 | Comments:0 | Tags:Fraud Protection Malware Threat Intelligence Advanced Threat

Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns

Throughout the years, banks have expanded their services by offering an ever-evolving set of online capabilities. As a result, financial institutions have become an obvious target for cybercrime and have been quick to deploy various layers of protection to keep their customers safe. Cybercriminals are looking for online money to grab as a day job. Many opera
Publish At:2017-08-07 21:55 | Read:3168 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Authentication

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud