Manager, Security Operations Center
Fraud Prevention Part 2 of 2: Developing a High-Impact Fraud Protection Program
In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program. A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier blog posting. Sophisticated techniques to evade detection Today’s cybercriminals use a host obfuscation techniques to evade detection which  makes it extremely difficult to identify the many elements needed to investigate  cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to... Read More
Portfolio Marketing Manager
Fraud Prevention Part 1 of 2: Trends in Social Engineering
In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews  current trends in social engineering. Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidential information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. There are three main categories of fraud: [1] Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are... Read More


Follow Us

Get all the latest updates

Get all the latest updates

Featured Author

Alison Simpson
With more than 13 years’ experience in the domain industry, Alison has managed all aspects of Corporate Domain Managem... More