This tag contain 1 private blog which isn't listed here.
Contributing Writer
How The Financial Industry and Its Customers Benefit from MarkMonitor’s Extensive Fraud and Brand Protection Services
MarkMonitor's Senior Vice President Charlie Abrahams interviews with blogger Aaron Lay about solutions for online counterfeiting, fraud, piracy, and other threats. This article originally appeared here at In a Nutshell: When major financial institutions are the targets of cyber attacks, not only are their customers’ wallets affected, but their brand’s reputation takes a hit as well. The monetary and character damage affects the bank’s ability to do business with its customers in good faith, which often leads to a decline in consumer confidence. And banks certainly aren’t alone. Virtually every business sector is a potential target for attacks, which has led... Read More
Manager, Security Operations Center
Fraud Prevention Part 2 of 2: Developing a High-Impact Fraud Protection Program
In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program. A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier blog posting. Sophisticated techniques to evade detection Today’s cybercriminals use a host obfuscation techniques to evade detection which  makes it extremely difficult to identify the many elements needed to investigate  cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to... Read More
Portfolio Marketing Manager
Fraud Prevention Part 1 of 2: Trends in Social Engineering
In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews  current trends in social engineering. Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidential information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. There are three main categories of fraud: [1] Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are... Read More


Follow Us

Get all the latest updates

Get all the latest updates

Featured Author

Alison Simpson
With more than 13 years’ experience in the domain industry, Alison has managed all aspects of Corporate Domain Managem... More