I’m guessing quite a few people did back on May 13, 2017, a Saturday, when a unique new ransomware, dubbed WannaCry, swept the world, targeting computer systems in almost 100 countries. This malicious software, stolen from the National Se...curity Agency, was distributed via email to many large global companies and government agencies, taking over the computers and encrypting the data files. The ransom demand was for $300 or more via Bitcoin (anonymous online currency), to receive the encryption key needed to unlock the files.
Ransomware of this nature leaves many corporations in a bit of quandary. Should they pay...Read More
Last year I wrote Tax Season Equals Fraud Season, and this year is no different. On February 3, the IRS issued an urgent alert warning businesses that threat actors are again using the same executive impersonation scam from last year, except in 2017 ...they have expanded beyond for-profit businesses to non-profit organizations, such as schools, tribal organizations, and non-profits.
The most prevalent type of scam in circulation at the moment is often referred to as Business Email Compromise (BEC) or Business Email Spoofing (BES). Essentially it consists of a cleverly manufactured email designed to look legitimate – often using lookalike domain...Read More
The entertainment media industry has changed and is experiencing explosive growth. The U.S. media and entertainment market is projected to grow to $771 Billion by 2019. This represents just one-third of the global industry which is set to reach $2 Tr...illion this year, with growth rates of over 20%. In the U.S. adults now spend half of their waking life consuming media, squeezing an average of 12 hours, 5 minutes per day of media usage into their waking hours. People no longer distinguish between on-line and off-line media. They are eager to share their online and offline experiences on social media...Read More
Last month, we were delighted to celebrate our customers at the 10th MarkMonitor Forum held recently in San Francisco. The event offered a wealth of exciting examples of how leading companies and industry advocates are innovating their brand protecti...on and domain management strategies. Our attendees shared their personal experiences, exchanged ideas with their peers, and walked away with knowledge and insights that only a live event like this can provide.
Contributing to the forum’s success was our incredible lineup of speakers, who covered a wide range of topics that included brand protection, domain management, antipiracy, and anticounterfeiting. Here are a few...Read More
In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program.
A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier... blog posting.
Sophisticated techniques to evade detection
Today’s cybercriminals use a host obfuscation techniques to evade detection which makes it extremely difficult to identify the many elements needed to investigate cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to...Read More