Fraud

Fraud news, analysis, research, how-to, opinion, and video.

people icons chasing shopping carts commerce
credit card fraud

online dating scams hacker beautiful woman

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

calculator numbers math accounting

Yes, fraud affects your bottom line

It also impacts conversion, customer experience and customer retention.

pile of credit cards financial tech

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

cybersecurity

2018 cybersecurity trends and predictions

The new year brings new challenges and opportunities in cybersecurity.

wallet cash credit card pocket money belt

The truth about RFID credit card fraud

Despite demonstrations to show it's possible, documented cases of RFID credit card fraud are unknown. And as security professionals know, there is a huge gulf between potential crime and actual crime.

email virus threat attack

Business email fraud – financial scams under the guise of authority

A 1,300% increase in losses resulting from business email compromise is nothing short of an epidemic.

GitHub cat logo pumpkin carving

Protect and serve: fraud fighting finds a partner in machine learning

Machine learning is proving to be a valuable tool when it comes to balancing security vs. user experience.

spearfishing trap

Multi-stage spear phishing – bait, hook and catch

Multiple step spear phishing is the latest iteration in social engineering from sophisticated cyber criminals.

p1240381 11

Scammers sent follow-up emails in Office 365 phishing campaign

As previously reported on Salted Hash, a recent phishing email looking to harvest credentials was actually part of an ongoing phishing campaign targeting Office 365 customers. The campaign has been going on since late 2016, and is...

synergy

The time for convergence Is now

Until today, anti-fraud, security and authentication activities in organizations have operated as largely-separate domains, with IT ops even more separated, in most cases. It won't be easy, but convergences is going to happen, and...

06 bank accounts atm

Fraud stories, part 2: digital identity and new account openings

Account takeover attacks are among the fastest growing cybersecurity threats that we face today.

texasflood relief

Volunteer your services, not your personal information

With the increase of natural disasters in the United States, more people are getting involved in the relief effort by donating their time. Ad-hoc volunteer groups are using free tools to join and lend a hand, but is their information...

p1240307 6

Office 365 phishing – A quick look at a recent example

On Thursday, an interesting email showed up in my inbox. The message says there are emails pending, because I've used 98-percent of my storage space. In order to fix this, I needed to download and save the attached configuration. The...

innovation concept

Keep innovative fintech open to customers, closed to fraudsters

Although rapidly evolving frictionless payments market has created new revenue opportunities for financial institutions and has benefitted us as end users and consumers, it has also opened the door to increased risk and financial...

android oreo livestream

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked together to take down an Android-based botnet responsible for several DDoS attacks earlier this month.

credit card fraud

Fraud stories, Part 1

Welcome to Fraud Stories, a new blog focused on digital identity and online fraud, one of the most defining issues of our day.

mobile malware

Just say no to Facebook quizzes

Clickbait by any other name is just the same. These quizzes take your personal information, and leave with cookies and malware.

build freelance tech worker team teambuilding

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team.

Load More