Fraud

tripwire

Card-Not-Present Fraud: 4 Security Considerations for Point of Sale Businesses

As the retail world’s center of gravity shifts to the cloud, payment card fraud has followed suit. According to Verizon’s retail vulnerabilities study, attacks against e-commerce applications are by far the leading cause of retail data breaches. This trend mirrors similar outcomes in other industries, like food service. A complimentary Verizon study finds remote attacks against food service operators on the rise, as well.

CISA's recommendations on how to recognize and avoid email scams

Just as remote work has grown at an unprecedented rate across the world, so too have the number of email scams. Email is now the most popular attack vectors among adversaries. We've prepared a guide to help you understand the anatomy of popular email-based scams, how they work, and what you can do to avoid them. Key insights from the e-book.
inetco

Peace out this holiday season by securing every transaction against card-not-present fraud

We are about to enter the most wonderful time of the year. As consumers increasingly turn towards online and mobile commerce, are you confident in your card-not-present fraud detection capabilities? 2020 has been a year of great surprise and change. While the global health pandemic has changed how we physically interact with each other, it has also revolutionized how we shop.

cloudera

How a modern data platform supports government fraud detection

November 15-21 marks International Fraud Awareness Week – but for many in government, that’s every week. From bogus benefits claims to fraudulent network activity, fraud in all its forms represents a significant threat to government at all levels. Some experts estimate the U.S. government loses nearly 150 billion dollars due to potential fraud each year, McKinsey & Company reports.

cloudera

Fraud Prevention - 3 Data Strategies for Financial Services

Fraud awareness in the Financial Services industry is more important than ever. According to the September 2020 benchmarking report conducted by the Association of Certified Fraud Examiners (ACFE) in response to the coronavirus, 77% of survey respondents, representing a range of industries, have observed an increase in the overall level of fraud as of August, compared with 68% in May. The report reveals 68% of respondents have observed an increase in payment fraud schemes (vs.

alienvault

Phishing awareness and phishing training explained

There is no more effective initial attack vector than phishing. With an ability to reach well-within your organization’s logical perimeter all the way down to an individual user’s Inbox with some form of malicious content, phishing has proven to be a challenge to organizations working to maintain a proper security stance. On top of this, phishing attacks have some pretty impressive accolades.

cloudera

Combating Fraud in Insurance with Data

Well, it is International Fraud Awareness Week, focused on promoting fraud prevention and education. A fantastic initiative! Maybe I am naïve but I feel a bit sad that there is a need for “fraud week”. The insurance industry has a long and intimate relationship with fraud in many different ways. Insurance fraud can take place at a process or business function level, most notably in claims or underwriting.

alienvault

Online purchase scams spike since the start of COVID-19, reports BBB

Scams occurring during online purchases have spiked since the start of the pandemic, as reported in new research conducted by the Better Business Bureau (BBB). Around 80.5% of consumers who reported this type of scam this year lost money, compared to 71.2% in 2015. Online purchasers scams have been among the three riskiest scams for the past three years but the situation has become significantly more severe in 2020.

alienvault

What is Smishing? SMS phishing explained

SMS phishing, or “Smishing,” is a mobile phishing attack that targets victims via the SMS messaging channel rather than through email. A natural evolution of the phishing phenomenon, smishing attacks attempt to dupe mobile users with phony text messages containing links to legitimate looking, but fraudulent, sites. These smishing sites try to steal credentials, propagate mobile malware, or perpetrate fraud.