Discover how shared intelligence is driving unprecedented collaboration in the fight against payments fraud
The data deluge associated with the growing diversity in payment types has diluted the strength of any single signal as a fraud indicator.
To respond, financial institutions must find ways to increase the...
Cybersecurity professionals expect a spike in ransomware attacks against school districts and universities this fall as new hybrid learning environments go online and unpatched equipment that has spent months in the homes of students and faculty is reconnected to school networks.
The Lazarus Group, which has ties to the North Korean government, recently targeted an employee of a cryptocurrency exchange with a fake job offer in order to plant malware and steal virtual currency, according to F-Secure.
A hack-for-hire campaign targeting an "international architectural and video production company" serving high-end real estate ventures likely involved corporate espionage driven by a developer eager for insider data, according to an analysis from security firm Bitdefender.
Continued growth in eCommerce has made it even easier for fraudsters to leverage stolen data to defraud online retailers and their customers.
In this whitepaper, you will learn how to combat this trend and what retailers must do to step up their fraud detection and prevention measures while still creating a...
Uncover how fraudsters exploit the customer journey & understand how their behaviors make early detection possible.
This eBook explores how different types of fraud affect the customer journey, the fraud-flow of the most prevalent fraud use cases, and how using Behavioral Biometrics can stop fraudsters at different...
The eCommerce marketplace today is overrun by automated bots. While some of these bots are good and perform useful services (like web crawlers for search engines), many are used for nefarious ends. Not all bad bots are illegal. But in some way or another, they all end up disturbing your operations, frustrating your...
The development of Behavioral Biometrics offers a solution that can strike a balance between friction and security. Behavioral data - the data used in Behavioral Biometrics technology - represents users' innate behavioral interactions with websites, applications, devices and more. It is a powerful data source that...
Despite rapid and widespread deployment, APIs remain poorly protected and automated threats are mounting. Personally identifiable information (PII), payment card details and business-critical services are at risk due to bot attacks.
Download this whitepaper to learn more about:
Symptoms of bot attacks on APIs
Key...
Ransomware gangs are increasingly not just claiming that they'll leak data if victims don't pay, but following through. On average, about a quarter of all successful ransomware attacks feature a gang claiming to have first stolen data. But in recent months, the number of gangs actually doing so has surged.
Political campaigns are at risk from nation-state actors and other hackers seeking to exploit network vulnerabilities and create backdoors to access sensitive data that can be used to undermine the November election, says retired Brigadier General Francis X. Taylor, executive director of U.S. CyberDome.
Jeff Schilling, global CISO at Teleperformance, a Paris-based company offering digitally integrated business services worldwide, describes four principles for mitigating security risks for the remote workforce during the COVID-19 pandemic.
Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organizations are fighting social engineering attacks?
ProofPoint's sixth annual State of the Phish report gives...
In the face of growing cybersecurity threats, it is increasingly important to measure the cost and concentration of "exposure." Having an accurate view of the resilience of organizations and industries against cyber-attacks can help target efforts to reduce exposure to the sectors that need it most and enhance...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.