Last year I wrote Tax Season Equals Fraud Season, and this year is no different. On February 3, the IRS issued an urgent alert warning businesses that threat actors are again using the same executive impersonation scam from last year, except in 2017 ...they have expanded beyond for-profit businesses to non-profit organizations, such as schools, tribal organizations, and non-profits.
The most prevalent type of scam in circulation at the moment is often referred to as Business Email Compromise (BEC) or Business Email Spoofing (BES). Essentially it consists of a cleverly manufactured email designed to look legitimate – often using lookalike domain...Read More
The entertainment media industry has changed and is experiencing explosive growth. The U.S. media and entertainment market is projected to grow to $771 Billion by 2019. This represents just one-third of the global industry which is set to reach $2 Tr...illion this year, with growth rates of over 20%. In the U.S. adults now spend half of their waking life consuming media, squeezing an average of 12 hours, 5 minutes per day of media usage into their waking hours. People no longer distinguish between on-line and off-line media. They are eager to share their online and offline experiences on social media...Read More
Last month, we were delighted to celebrate our customers at the 10th MarkMonitor Forum held recently in San Francisco. The event offered a wealth of exciting examples of how leading companies and industry advocates are innovating their brand protecti...on and domain management strategies. Our attendees shared their personal experiences, exchanged ideas with their peers, and walked away with knowledge and insights that only a live event like this can provide.
Contributing to the forum’s success was our incredible lineup of speakers, who covered a wide range of topics that included brand protection, domain management, antipiracy, and anticounterfeiting. Here are a few...Read More
In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program.
A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier... blog posting.
Sophisticated techniques to evade detection
Today’s cybercriminals use a host obfuscation techniques to evade detection which makes it extremely difficult to identify the many elements needed to investigate cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to...Read More
In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews current trends in social engineering.
Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidenti...al information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
There are three main categories of fraud:
 Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are...Read More