Monday, March 27, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there
  • Cyber-readiness and Changing Federal Government SBOM Requirements
  • Survey Surfaces Need to Change SecOps Priorities
  • Streaming Services and Cybersecurity
  • Threat Spotlight: Generative AI
Security Bloggers Network 

Home » Security Bloggers Network » Loyalty Points Fraud: Why Reward Programs are a Growing Target

SBN

Loyalty Points Fraud: Why Reward Programs are a Growing Target

by Heidi Bleau on November 26, 2018

What’s moving to the top of fraudsters’ holiday shopping lists this year? Reward points. With banks and credit card issuers making card fraud tougher than ever, fraudsters have set their sights on another target: loyalty points programs. And why not? Loyalty points accounts are easy pickings—typically guarded by little more than a username/password combination, and often forgotten by consumers until they’re ready to use them. Once acquired, they’re easily redeemed for flights, hotel rooms, gift cards and merchandise, or offered for sale on the dark web for a fraction of their face value.

Perhaps you have been building up travel points for a family vacation or hotel rewards for a romantic weekend getaway.  Unlike your bank or credit card, you are probably not checking the balance on your customer loyalty accounts, and fraudsters could be stealing reward points without you even knowing it. Recent reports of loyalty program-related airline and hotel data breaches suggest these types of attacks are on the upswing, and RSA research supports the idea. Our data analysis of one major dark web marketplace shows that travel/hospitality businesses and rewards programs collectively make up 13 percent of the types of accounts for sale.

TechStrong Con 2023Sponsorships Available

Phishing is another source fraudsters use to acquire access to loyalty points accounts. RSA saw a 70 percent increase in global phishing attacks in Q3 which is typical as fraudsters look to harvest fresh credentials to use during the holiday shopping season. Here’s what you need to know about the kinds of tactics (Read more...)

*** This is a Security Bloggers Network syndicated blog from RSA Blog authored by Heidi Bleau. Read the original post at: http://www.rsa.com/en-us/blog/2018-11/loyalty-points-fraud-why-reward-programs-are-a-growing-target.html

November 26, 2018November 26, 2018 Heidi Bleau account takeover, adaptive authentication, credential testing, Cybercrime and Fraud, Fraud Management, fraud prevention, Loyalty Points Fraud, Loyalty Program Fraud, Phishing, Reward Points Fraud, smishing
  • ← MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow
  • Introducing: native integration with AWS tags for SSH access management →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

Is Trafficking in Hacking Information a Crime?
Using Deception to Learn About Russian Threat Actors
Phishing, Brute Force Attacks Rise in Expanded Threat Landscape
Modern Cybersecurity Problems Need Next-Gen PAM Solutions
Business Email Compromise Threats Soar Past Phishing Risks
USENIX Security ’22 – ‘QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore’
Top Data Breaches in 2022 and 2023 Point to Increases in Phishing and Ransomware
The Power of Open-Source Security: A Deep Dive
Throwing Caution to the Wind: The Challenges of Securing Wind Power
Using ChatGPT to Improve API Security: Open AI & Security

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 20

Lessons From a Live Hack: Secure Your Cloud From the Inside

April 20 @ 3:00 pm - 4:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | Mar 17 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Survey Surfaces Need to Change SecOps Priorities
Analytics & Intelligence CISO Suite Cloud Security Cybersecurity Data Security Featured Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Survey Surfaces Need to Change SecOps Priorities

March 27, 2023 Michael Vizard | Yesterday 0
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
Analytics & Intelligence Application Security Cybersecurity Featured Identity & Access Network Security News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence 

Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences

March 27, 2023 Michael Vizard | Yesterday 0
Cybersecurity Leaders Stressed Over Email Security
Application Security Cloud Security Cybersecurity Endpoint Featured Mobile Security Network Security News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Cybersecurity Leaders Stressed Over Email Security

March 21, 2023 Nathan Eddy | Mar 21 0

Security Humor

Randall Munroe’s XKCD ‘Relative Terms’

Randall Munroe’s XKCD ‘Relative Terms’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.