HackDig : Dig high-quality web security articles for hacker

Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security

Layered schemes are used in most information security strategies, and it is essential to establish a similar approach to protecting the organization from unwanted email. In fact, spam and phishing are some of the biggest problems IT security managers face today. According to LinkedIn’s “2017 Cybersecurity Trends Report,” phishing attacks ar
Publish At:2017-08-17 19:00 | Read:202 | Comments:0 | Tags:Fraud Protection Risk Management Email Fraud Prevention Phis

Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns

Throughout the years, banks have expanded their services by offering an ever-evolving set of online capabilities. As a result, financial institutions have become an obvious target for cybercrime and have been quick to deploy various layers of protection to keep their customers safe. Cybercriminals are looking for online money to grab as a day job. Many opera
Publish At:2017-08-07 21:55 | Read:245 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Authentication

New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Every year, cyberattacks become more sophisticated, new malware emerges and fraud losses rise. Have you ever looked at your banking information to see a transaction that you didn’t make? Have you ever checked your credit report to find cards you never signed up for or high balances you didn’t create? Unfortunately, financial fraud is an issue ma
Publish At:2017-06-27 02:05 | Read:240 | Comments:0 | Tags:Fraud Protection Risk Management Bank Fraud Banking Security

Phishing Attacks Collect 70 Percent of Credentials Within the First Hour

Have you ever been phished? Would you know the difference between a phishing website and your bank’s legitimate website? We all hope we could identify the difference between our financial institution’s domain and a phony one. However, statistics indicate that 30 percent of phishing emails are opened. To make matters worse, more than 400,000 frau
Publish At:2017-04-17 20:15 | Read:525 | Comments:0 | Tags:Fraud Protection Financial Phishing Fraud Fraud Prevention I

Cybercriminals Riding Tax Filing Tides: Tax Fraud Season in Effect

Data theft is a year-round, opportunistic crime, but seasonal events often trigger rises in spam and fraud. The most significant such example is tax fraud riding the wave of tax filing season. It’s That Time of Year Again Every year, tax filing season, which extends from January to April in the U.S., is one of the most popular opportunities for cybercr
Publish At:2017-04-05 18:20 | Read:707 | Comments:0 | Tags:Fraud Protection Risk Management X-Force Research Financial

Hey Phishing, You Old Foe — Catch This Cognitive Drift?

Phishing is one of the internet’s oldest online threats. Its history traces back to the mid-1990s, but it unfortunately continues to escalate in numbers. Based on social engineering, phishing can be delivered to an email address or through an SMS message with a URL inside. It can even come from inside a document saved locally on the recipient’s e
Publish At:2017-03-27 13:00 | Read:751 | Comments:0 | Tags:Banking & Financial Services Cognitive Fraud Protection Frau

Adaptive Security: The Safety Net in the Flying Trapeze Act

Fighting Fraud With Adaptive Security The “2017 Identity Fraud Study” by Javelin Strategy & Research revealed that the number of identity fraud victims has increased by 16 percent, rising to 15.4 million U.S. consumers. The study also found that despite the ongoing efforts to prevent these breaches, fraudsters were able to steal a total amoun
Publish At:2017-02-22 20:25 | Read:516 | Comments:0 | Tags:Cognitive Fraud Protection Cognitive Computing Cognitive Sec

Why 53 Percent of Banks Think Security Controls Negatively Impact Customer Experience

How do you tell if a legitimate customer or a fraudster is signing into your online banking platform? How do you know if the authentication measures your organization is using are effective? How important is it to your organization to provide a seamless customer experience while maintaining adequate security controls? The Problem With Customer Security These
Publish At:2017-02-02 20:55 | Read:1046 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Bank Fraud Ban

Designer Wallet or Mobile Wallet: Which One Do You Carry?

Nov. 8, 2016, is etched in my memory as the day the Indian government made a life-changing announcement regarding demonetization. With higher value currency being made invalid for transactions, my fancy Michael Kors wallet faced a sudden existential crisis. While the early days of demonetization brought a mad scramble to ATMs and banks, mobile wallet provide
Publish At:2017-01-24 15:55 | Read:762 | Comments:0 | Tags:Mobile Security Banking Banking Security Fraud Fraud Prevent

Chip-and-PIN Credit Cards, One Year On

The U.S. was not an early adopter of chip-and-PIN credit cards, lagging behind major European countries and others. But more than a year after the official mandatory shift to this technology, the transition has reshaped most credit card transactions. As a result, the rate of credit card fraud is down sharply. Catching Up With Chip-and-PIN Credit Cards The co
Publish At:2016-12-30 00:35 | Read:821 | Comments:0 | Tags:Fraud Protection Retail Credit Card Credit Card Fraud EMV Fr

Real-Time Payments, Real-Time Fraud Risks?

Real-time payments, near real-time payments, faster payments, immediate payments — those are just some names used to describe the increasing speed of the settlement transaction process. Slow clearing times for payments can have a negative effect on businesses and consumers, but a quicker process may introduce fraud risks. The National Automated Clearing Hous
Publish At:2016-12-06 20:15 | Read:1222 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Risk Managemen

Some websites turning law-abiding Tor users into second-class citizens

About 1.3 million IP addresses—including those used by Google, Yahoo, Craigslist, and Yelp—are turning users of the Tor anonymity network into second-class Web citizens by blocking them outright or degrading the services offered to them, according to a recently published research paper.Titled "Do You See What I See? Differential Treatment of Anonymous Users,
Publish At:2016-02-24 17:40 | Read:911 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab anonymity frau

The InfoSecond, Dec. 7–11: Crazy Hacks of 2015, Charity Fraud and More!

In this week’s brand new InfoSecond we’re tackling the curious case of charity fraud and how criminals target their victims in the holiday season, sneaking a peek at the all-new infographic on data breaches in the health care industry, looking back at eight of the craziest hacks of the past year, and nerding out over the recent collaborative effo
Publish At:2015-12-13 18:20 | Read:782 | Comments:0 | Tags:Data Protection Fraud Protection Botnet Cybercrime Data Brea

Charity Fraud Trifecta: Phishing, Vishing and Smishing

The holiday season is upon us, which means fraudsters are on alert and looking to take advantage of the goodwill of the unsuspecting. According to the National Center for Charitable Statistics, between 25 and 43 percent of annual giving is done between Thanksgiving and New Year’s. As such, fraudsters engaging in charity fraud often create fake charitie
Publish At:2015-12-03 23:15 | Read:974 | Comments:0 | Tags:Banking & Financial Services Fraud Protection charity fraud

The InfoSecond, Oct. 12–16: Disaster Fraud, Attack Scenarios and More!

Disasters, SOCs, Attacks, and Dyre straits… it’s time for an all-new InfoSecond! In our latest entry, we touch on criminals capitalizing on disasters – and who they’re targeting, the three questions you should ask before setting up a Security Operations Center (SOC), connecting the data on attack scenarios using the latest findings, and how
Publish At:2015-10-20 15:15 | Read:654 | Comments:0 | Tags:Fraud Protection Disaster Recovery Dyre Trojan Fraud Fraud P


Share high-quality web security related articles with you:)


Tag Cloud