GUEST ESSAY: U.S. ‘chip’ adoption reduces card scams — but drives up new account fraud

Identity theft and fraud hit an all-time high in 2017, according to the 2018 Identity Fraud Study released last week by Javelin Strategy & Research. Among Javelin’s key findings fraudsters claimed 1.3 million more victims in 2017, with $16.8 billion stolen. That’s a record high since 2003 when the firm first began tracking identity theft
Read more

GUEST ESSAY: Fraudsters adjust to wide use of ‘chip’ cards – new account fraud rising

Identity theft and fraud hit an all-time high in 2017, according to the 2018 Identity Fraud Study released last week by Javelin Strategy & Research. Among Javelin’s key findings fraudsters claimed 1.3 million more victims in 2017, with $16.8 billion stolen. That’s a record high since 2003 when the firm first began tracking identity theft
Read more

Q&A: Why SMBs should heed lessons from Equifax breach and mitigate ‘open source’ risks

Hackers were able to ransack Equifax last year, and steal personal data for some 143 million citizens, by exploiting a vulnerability in an open-source component, which the credit bureau failed to lock down. The hackers leveraged a vulnerability in something called Apache Struts, an open-source application framework that supports the credit bureau’s web portal —
Read more

MY TAKE: Here’s how the U.S. economy would lose $15 billion from a 3-day cloud outage

Cyber attack scenarios have become fairly common. It doesn’t take too much imagination to conjure plausible assumptions and project Armageddon-scale damages attributable to crippling cyber attacks. One prime example is the Herjavec Group’s 2017 cybercrime report which suggests damage caused by cyber criminals is climbing towards a whopping $6 trillion in annual global encomic damage
Read more

NEWS WRAP-UP: Meltdown, Spectre discovered in the wild – live hardware attacks one step closer

Week ending Feb. 9, 2018. We’re now one step closer to witnessing cyber criminals exploiting a new class of vulnerability that exists in the hardware level of virtually every computing device in active use. Nearly 140 samples of malware that exploit the Meltdown and Spectre vulnerabilities have been discovered by AV-TEST. Most of these are
Read more

NEWS WRAP-UP: Dutch spies corroborate Russia’s meddling in U.S. election — and 19 EU nations

Week ending Feb. 2, 2018. Even more substantive corroborating evidence of Russia’s proactive interference in the 2016 U.S. presidential election comes from the Netherlands. European news reports detail how a Dutch intelligence agency secretly hacked into the Kremlin’s most notorious hacking group, Cozy Bear, and tracked Cozy Bear’s election tampering activities. Dutch spies passed all
Read more

GUEST ESSAY: How children using illegal streaming devices get targeted by malicious actors

It is good to see pressure from advertisers  prompting a tech titan to clean up its digital neighborhood. I refer to steps being taken recently by Alphabet,  the parent conglomerate of Google and YouTube. Alphabet announced a new plan to keep ads from premium brands off YouTube pages with videos pushing dangerous, illegal, and/or illicit
Read more

MY TAKE: What ace-in-the-hole does Devon Nunes have that McCarthy would have loved?

When Russian botnet controllers deployed their bots on yet another social media blitz last week, they participated in a campaign that took a page from Sen. Joseph McCarthy’s play book, On Feb. 9, 1950, at the height of the Cold War, McCarthy infamously brandished a list of what he claimed were 57 subversive communists who
Read more
Page 1 of 41234