This tag contain 1 private blog which isn't listed here.
On Wednesday, February 24, I hosted a webinar—Best Practices from Verizon, Proactively Mitigating Emerging Fraudulent Activities—with Patrick Flaherty, Assistant General Counsel for Marketing, IP & New Media Law & Policy at Verizon. Verizon, the largest wireless company in the U.S. with more than 110 million customers across the country, is committed to providing excellent customer service and exceptional communications and entertainment experiences. However, this commitment is challenged by the prevalence of phishing attacks that harm the famous Verizon brand. Specifically, fraudsters attempt to steal customer information, including account usernames and passwords and generate bogus charges that are for everything from popular... Read More
Business Email Compromise (BEC) scams are impersonation emails sent to selected recipients – often a CFO or assistant, that appear to be from a CEO – requesting an immediate wire transfer with attached account details. According to the FBI, thieves stole nearly $740 million in such scams from more than 7,000 victim companies in the U.S. between October 2013 and August 2015. Vistaprint, a web services company, has unwillingly become a conduit for increasing email scams by promoting a free one month trial of their Website Builder product. This is a great deal for the Vistaprint user: they can choose a... Read More
Depending on the industry and type of scam, fraudsters monetize credentials and data in a number of ways. While certain industries are familiar with phishing scams and understand how fraudsters monetize their data, it’s not necessarily clear for all industry verticals. One of the largest, most well-known target of phishing attacks is financial institutions. Fraudsters leverage a number of social engineering scams to steal login credentials and credit card information from financial customers. Fraudsters can then sell stolen credentials and credit card information via social media, chat forums, underground marketplaces, etc. Leveraging anonymizer technology to access the DarkNet, fraudsters are providing... Read More
Traditionally, the financial industry has always been a primary target for phishing attacks. And so far, that trend seems to remain true. In the first half of 2015, 41% of the phishing attacks targeted the financial industry. It’s still an issue and financial institutions must continue to proactively focus on their anti-fraud strategies. But here’s what I think is interesting, when we removed the financial industry from the equation and just looked at phishing trends for key non-financial industries – phishing attacks have practically quadrupled since January 2014. It’s a significant increase that is difficult to ignore. [caption id="" align="alignnone" width="731"]... Read More
By now, you’ve likely heard about the Deep Web and the Darknet – but what are they, and should brand owners be concerned about monitoring and enforcing on the nether regions of the Internet? You betcha. The Deep Web, unlike the Surface Web, is comprised of un-indexed webpages, dynamic content pages, and otherwise gated information inaccessible via a regular browsers or search engines. The Surface Web is what we would consider “regular” webpages that can be indexed by search engines. What many people don’t realize is that most of the Internet is actually in the Deep Web, and mainstream browsers will... Read More
Get all the latest updates
Get all the latest updates