In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program.
A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier... blog posting.
Sophisticated techniques to evade detection
Today’s cybercriminals use a host obfuscation techniques to evade detection which makes it extremely difficult to identify the many elements needed to investigate cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to...Read More
In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews current trends in social engineering.
Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidenti...al information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
There are three main categories of fraud:
 Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are...Read More
The Second Annual MarkMonitor Summit was held in New York City on April 12th. MarkMonitor® brought together leading experts from a broad variety of industries and government agencies to share best practices and enforcement strategies for brand ...protection, domain management, and digital piracy. The Summit was also an excellent opportunity to interact with individual Client Service Managers (CSMs) from both the Domain Management and Brand Protection departments.
The event kicked off with an opening keynote from Phillippa Scarlett, United States Deputy Intellectual Property Enforcement Coordinator (IPEC) in the Executive Office of the President. Ms. Scarlett discussed the role of IPEC in...Read More
The 2016 tax season started with a bang and hasn’t relented! In February the U.S. Internal Revenue Service (IRS) issued press releases indicating that, identity theft, phone and phishing scams are still at the top of their list of “dirty dozen” tax s...cams – and they’re growing. By the Numbers From January through March 2016 MarkMonitor detected an 82% increase in classic web-based phishing attacks targeting the IRS compared to the previous year. Additionally the IRS is reporting a whopping 400% increase in email, phone, or text phishing, malware, and other email-based scams exploiting tax season financial vulnerabilities. Constantly Evolving Scams...Read More
On Wednesday, February 24, I hosted a webinar—Best Practices from Verizon, Proactively Mitigating Emerging Fraudulent Activities—with Patrick Flaherty, Assistant General Counsel for Marketing, IP & New Media Law & Policy at Verizon.
Verizon, ...the largest wireless company in the U.S. with more than 110 million customers across the country, is committed to providing excellent customer service and exceptional communications and entertainment experiences. However, this commitment is challenged by the prevalence of phishing attacks that harm the famous Verizon brand. Specifically, fraudsters attempt to steal customer information, including account usernames and passwords and generate bogus charges that are for everything from popular...Read More