A U.S. grand jury has taken the extraordinary step of indicting 13 Russian nationals and three Russian companies for allegedly interfering with the U.S. political system, including the 2016 presidential election, in what the Justice Department portrays as "information warfare against the United States."
Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election.
Achieving the Delicate Balance
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to move forward technologically? Healthcare is clearly at the complex crossroad of innovation and...
Criminals in Europe are annually laundering at least $4 billion - and growing - via cryptocurrencies, warns Europol. The agency is calling on regulators and legislators to regulate cryptocurrencies to help battle money laundering and protect consumers.
The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.
Australia is the latest country to roll out real-time payments, where funds from an account at one bank reach an account at another bank in seconds. While convenient, the system poses fresh fraud challenges and consumer protection concerns.
Information leaks on the dark web have become a major concern for all industries. With fraud - primarily fueled by the sale of stolen credentials, personal information, and financial information - making up a large portion of the dark web economy, the financial industry continues to be a high-risk target.
The success of a Business Email Compromise (BEC) attack lies in exploiting the trust and familiarity between sender and recipient, and evading traditional security solutions by eliminating the use of malicious URLs or attachments - which existing security solutions were never designed to do.
According to the FBI,...
Although some of the most prolific fraud sites exist on the clear web, the research captured in this report reveals numerous instances where data was leaked or
sold for the purposes of committing fraud.
Dark web vendors have thoroughly systematized the fraud trade. From basic to more sophisticated sites, hosts...
Illegal transactions on the internet have long been conducted in the cryptocurrency bitcoin. But underground vendors are accepting new kinds of virtual currency that may be safer to store and offer more privacy protections, according to a new study of 150 dark web markets and forums.
The adoption of e- and m-commerce has created new opportunities for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
However, preventing fraudulent transactions with fewer instances of false positives is possible by leveraging shared transaction data from a consortium of...
The U.S. Department of Justice, in one of its biggest-ever cybercrime disruptions, shuttered the Infraud Organization, an online forum prosecutors tied to $530 million in losses. Thirteen suspects - in Australia, France, Italy, Kosovo, Serbia, the U.K. and the U.S. - have been arrested.
As banks in the U.S. and Australia grapple with how to effectively launch faster payments, more will turn to big data and machine learning to help better manage expected upticks in fraud, says cybersecurity specialist John O'Neill Jr. of DarkTower.
An investment firm needed a managed endpoint detection and response solution that could integrate into its existing security program, which already included two managed providers.
Download this case study to learn how the firm was able to:
Seamlessly integrate their new solution alongside other managed...
A global financial institution with over 3,000 endpoints across 30 countries had a network that was large, distributed, and vulnerable to attacks. A multi-state bank had already invested in application white-listing, but gaps remained and endpoints were vulnerable.
So how were both institutions able to solve their...