In the aftermath of the pandemic and global political unrest, the risks of identity and credential theft have surged, and a deluge of scams are exploiting the crisis. Consumers facing disrupted incomes seek credit solutions, and fraudsters seek to exploit them by using application fraud tactics.
A U.S. couple is set to file a plea deal for their role in laundering $4.5 billion in cryptocurrency from the Bitfinex virtual currency exchange in 2016. Federal prosecutors say they moved crypto to hide their tracks, withdrew it from ATMs and used gift cards to spend the money.
Transaction monitoring must keep up with the multiple and fast-moving risks of today’s world. In addition to the many typologies by which criminals push illicit funds through the financial system, financial institutions are challenged to effectively counter the myriad of risks around black swan events, ESG crimes,...
This Case Study talks about how when E-Commerce organization Pat Pat’s business grew their true fraud chargeback fees and losses also started to increase.
They found it difficult to distinguish between their trusted users and fraudulent behaviour of bad actors and found it hard to keep up with the amount of...
The world is moving on from magnetic stripe payment cards, with one notable exception: the United States. Credit card issuers, banks and consumers agree the magnetic stripe is prone to hacking - so why is one of the largest markets for plastic payment still clinging to decades-old technology?
An Indian court convicted 11 people for their roles in the North Korean heist of $13.5 million in 2018 from Pune-based Cosmos Cooperative Bank. The United Nations attributed the thefts to North Korea, which uses criminal activity, including financially motivated hacking, to obtain hard currency.
Everyone knows why criminals rob banks. But since most robbers are operating remotely, which tactics are cybercriminals actually employing and how often are they successful? Too often, it seems, thanks to phishing attacks, money laundering, ATM skimmers, malware and more.
A French-speaking gang codenamed "Opera1er" has been tied to the theft of at least $11 million from dozens of victims - mainly banks in Africa - and remains "active and dangerous," cybersecurity researchers warn, as they release indicators of compromise to help potential victims protect themselves.
Response to supply chain attacks has evolved thanks to increased awareness and education, but more work needs to be done to understand how challenges can be addressed more systematically, says Sean Duca, vice president and regional chief security officer, Asia-Pacific and Japan, Palo Alto Networks.
Fraudsters compromised debit card numbers and associated PINs, and possibly names and addresses, of an undisclosed number of Bank of the West customers. Unknown thieves installed skimmers in a "small number of ATMs," the bank's COO, Karl Werwath, tells ISMG.
Insurance claims being filed by ransomware victims are growing as criminals continue to hit businesses with crypto-locking malware. To avoid these claims, organizations can take a number of proven steps to better protect themselves, says Payal Chakravarty of Coalition.
This past holiday shopping season proved to be yet another demanding, but lucrative one. The season was greeted with challenges such as supply chain shortages, and threat actors being especially busy leveraging tried and true methods, as well as some new ones, to take advantage of retailers and their employees. This...
Learn how advanced analytics and machine learning help financial organizations proactively detect and prevent fraudulent payments.
As new payment types proliferate globally, payment and identity fraud is also skyrocketing. In 2021, global card fraud losses hit a staggering $28.58 billion.
To survive and stay...
F5 Shape Security provides real-time monitoring & intelligence that protects firms from both human and bot-driven fraud before they can impact their businesses, all without disrupting the customer experience.
Forrester found in their survey that organizations that deployed Shape Security improved bot blocking by up...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.