5 Trends in Ecommerce Fraud: How to Protect Your Business in 2021 and Beyond

These days, when I cautiously venture to my favourite shopping mall on a weekend, I notice how different it is from a year-and-a-half ago, when no one had ever heard of COVID-19. It is busy, but not nearly as busy as it was back then. Sadly, I can rarely find my shoe size as merchandise stocks are low due to COVID-related supply chain issues.


INETCO Launches Game-changing Payment Fraud Solution

Vancouver, Canada – September 14th, 2021 – INETCO Systems Limited, a leader in real-time payment fraud prevention, is pleased to announce the launch of INETCO BullzAI, which combines a web application firewall with a real-time payment fraud detection and blocking system in one elegant solution.


Don't Let Account Takeovers (ATO) Take Over Your Business

A long time ago (in the early 2000s), I was playing games online. One of my accounts was compromised – the password was changed, and multiple “high-priced” items I had earned were “traded” without my knowledge, to the account of another player. One could easily blame my simple password at that time when there were no rules around password strength. Regardless of the reason, what happened was one of the earliest versions of an account takeover (ATO) attack.


An easy recipe for identity fraud - Post a dream job LinkedIn advert on behalf of almost any employer

This post is about LinkedIn – a go-to professional networking and jobs platform – a feature that allows outside individuals (not belonging to the target organisation) to post jobs on an organisation’s behalf. Whether you call it posting scam jobs on LinkedIn, phishing the LinkedIn users or any wider campaigns based on the drivers – it is a recipe for Identity fraud.


Stories from the SOC - Successful phishing attack

Every day, billions of emails are sent out, some legitimate, while others are used to target unsuspecting users. According to the FBI, phishing attacks were the most common type of cybercrime in 2020. The reason these are so commonly used is because phishing tools are easy to get a hold of and attackers are taking advantage of the weakest link when it comes to security – the employees.


The Identity Brief: A Conversation with an Ethical Hacker

Our first two guests on the Identity Brief Podcast came to identity through unconventional means. Ori Eisen saw digital identity and passwordless authentication as a way to fight the fraud he had witnessed while working at a large bank. Ari Jacoby realized that contextual identity and authentication data was a powerful tool to fight fraud at Deduce where he saw bots and fraudsters trying to gain an advantage.


How Social Norms Can Be Exploited by Scammers on Social Media

Social media platforms are excellent hunting grounds for scammers. This is where we connect with our friends or people who we have something in common with. This is precisely what scammers exploit—our connections and the trust that is afforded between friends or acquaintances. From an early age, we are taught to be kind and compassionate as well as to help others, especially people we know such as friends and family. In turn, they will help us if we ever need it.