Check Point says it has found three ways to falsify messages in WhatsApp, which it claims could be employed by scammers and used to spread fake news. WhatsApp acknowledges the findings, but it will not engineer patches.
Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns.
Known losses due to business email compromise have exceeded $12.5 billion worldwide, the FBI's Internet Complaint Center reports, adding that fraudsters are increasingly targeting the U.S. real estate sector with such scams.
It's a fair question: Can you trust the fraud advice you're given from a former fraudster? Especially one who's betrayed law enforcement before? Brett Johnson says he's abandoned crime for good, and he shares insight on the types of fraud schemes he once practiced.
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Restaurant reservation service OpenTable aims to create an amazing dining experience for its millions of users.
Sift Science enabled OpenTable to scale a highly successful digital gift cards program without increasing risk.
Read the case study to learn how to:
Limit manual review;
Move from a manual...
A group of cybercriminals known for their persistence and precision in executing attacks against banks' ATMs and card processing infrastructures has regrouped despite the arrest of their alleged leader.
Facebook has taken several moves aimed at minimizing misuse of social media during the 2019 elections in India. But are the actions merely a marketing maneuver, or could they have a real impact?
Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.
Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.
User-generated content is the lifeblood of online marketplaces and communities -- but content abuse is equally powerful. More than ever, fraudulent content is eroding the digital trust between business and users.
How can you protect your customers and your bottom line from fraudsters?
Download this whitepaper to...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
Attackers rarely bother with technical sophistication when easy social engineering schemes, such as "hacking" a victim's social network and using it against them, can give them what they want, says Markus Jakobsson, chief scientist at the cybersecurity firm Agari.
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.