In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews current trends in social engineering.
Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidenti...al information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
There are three main categories of fraud:
 Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are...Read More
The Second Annual MarkMonitor Summit was held in New York City on April 12th. MarkMonitor® brought together leading experts from a broad variety of industries and government agencies to share best practices and enforcement strategies for brand ...protection, domain management, and digital piracy. The Summit was also an excellent opportunity to interact with individual Client Service Managers (CSMs) from both the Domain Management and Brand Protection departments.
The event kicked off with an opening keynote from Phillippa Scarlett, United States Deputy Intellectual Property Enforcement Coordinator (IPEC) in the Executive Office of the President. Ms. Scarlett discussed the role of IPEC in...Read More
The 2016 tax season started with a bang and hasn’t relented! In February the U.S. Internal Revenue Service (IRS) issued press releases indicating that, identity theft, phone and phishing scams are still at the top of their list of “dirty dozen” tax s...cams – and they’re growing. By the Numbers From January through March 2016 MarkMonitor detected an 82% increase in classic web-based phishing attacks targeting the IRS compared to the previous year. Additionally the IRS is reporting a whopping 400% increase in email, phone, or text phishing, malware, and other email-based scams exploiting tax season financial vulnerabilities. Constantly Evolving Scams...Read More
On Wednesday, February 24, I hosted a webinar—Best Practices from Verizon, Proactively Mitigating Emerging Fraudulent Activities—with Patrick Flaherty, Assistant General Counsel for Marketing, IP & New Media Law & Policy at Verizon.
Verizon, ...the largest wireless company in the U.S. with more than 110 million customers across the country, is committed to providing excellent customer service and exceptional communications and entertainment experiences. However, this commitment is challenged by the prevalence of phishing attacks that harm the famous Verizon brand. Specifically, fraudsters attempt to steal customer information, including account usernames and passwords and generate bogus charges that are for everything from popular...Read More
We live in an online age, one where malware infections have become commonplace. Some might say this is the price of doing business online. News headlines report damaging attacks on well-known brands with depressing regularity. Consumer confid...ence suffers as customers look to organizations to sort out the issue, secure their transactions and fix the problem. But will it every truly get sorted? Fraudsters are now so skilled in their knowledge of human nature – how and why a person will respond to social engineering lures – that malware is growing faster than organizations' ability to respond to, never mind educating...Read More