Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fraud

When Should I Place a Fraud Alert?

You should place a fraud alert if you believe you are a victim of fraud or may become one, if you are a victim of identity theft or if you want to prevent your identity from being stolen. You don’t necessarily have to be a victim of fraud to place a fraud alert, you can also place a fraud alert as a security precaution. Continue reading to learn more about what a fraud alert is, how it differs from a credit freeze and how to place a fraud alert on your credit report.

Insights into modern fraud detection systems

Information security requirements and standards are in a constant state of evolution. Recent issues, such as COVID-19 and the growing global reliance on mobile devices and remote work solutions, have played important roles in this ongoing transformation. At the same time, the increasing sophistication of cyber attackers has added new layers of complexity to the cybersecurity landscape.

Top 10 Fraud Detection Solutions for 2024

It’s natural to want to believe that every new account creation or online purchase signals the legitimate growth of your business. But the alarming rise in financial and data losses attributed to fraud, suggests a different reality. There are thousands of bad actors actively looking to nickel and dime businesses and consumers. In 2022, a staggering 2.4 million fraud reports flooded the Consumer Sentinel Record.

12 Christmas Scams to Watch Out for This Holiday Season

On the twelfth day of Christmas, my true love gave to me... hopefully something better than a virus (computer or otherwise). As the end of the year is fast approaching, it has not been without its fair share of data breaches, hacks, and even the return of digital piracy. As we enter December and fast approaching the most wonderful time of the year, hackers, cybercriminals, and online fraudsters are looking to end the year with a bang.

What Is Email Spoofing and How Does It Work?

Email spoofing is a type of cyber threat where a cybercriminal sends emails to potential victims using fake sender addresses. Email spoofing works by forging a sender address to make it seem as though it’s coming from a legitimate person or company. Email spoofing is a tactic typically used by cybercriminals when carrying out phishing attacks to encourage their targeted victim to send them sensitive information.

The Types of Online Scams

Some of the different types of online scams you need to look out for are phishing scams, catfishing, job offer scams and online shopping scams. These online scams try to trick you into giving up your personal information, which scammers will use for malicious purposes. You need to learn how to recognize the different types of online scams to avoid falling for them.

Black Friday: Loved by Shoppers and Fraudsters Alike

For some, Black Friday conjures images of parasite-infected shoppers running amok in a mall. (Rotten Tomatoes gives the movie a 65% rating). For bargain hunters, it is a whirlwind of unbeatable deals and frenzied shopping sprees. Thanksgiving Day, Black Friday and Cyber Monday are the year’s biggest days for American merchants. The hype has crossed borders.

$9 million seized from "pig butchering" scammers who preyed on lonely hearts

US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US Department of Justice has announced that the seized funds are connected to cryptocurrency wallet addresses alleged to be associated with a "pig butchering" gang that has claimed over 70 victims around the world. "Pig butchering" is one of the world's fastest-growing types of scams.

Digital Skimming Increases by 50%, Just in Time for the Holiday Season

Security researchers identify growth in the use of an ongoing cyberskimming campaign that involves compromising legitimate website checkout code. We’ve all seen a video that shows someone fidgeting with a credit card terminal only to pull off a very realistic molded cover that looks identical to the actual device beneath it complete with its own circuitry to read and store credit card swipes. Now take that very same idea and put it into the digital world.