$40.2 million reminder about the importance of due diligence and monitoring

  Companies that deceive consumers often don’t act alone. Pull back the curtain and you may find behind-the-scenes businesses that lend a hand. The FTC alleges that Atlanta-based First Data Merchant Services and its former vice president, Chi “Vincent” Ko, engaged in conduct that helped scammers rake in megabucks at consumers’ expense. The $40.2 million […]

NIST Study Measures Performance Accuracy of Contactless Fingerprinting Tech

The National Institute of Standards and Technology (NIST) has evaluated several commercially available contactless fingerprint scanning technologies to compare their performance.   The results of the study, published as NIST Interagency Report (NISTIR) 8307: Interoperability Assessment 2019: Contactless-to-Contact Fingerprint Capture, show that devices requiring physical contact remain superior to contactless technology at matching scanned prints to images in […]

51% of Organizations Say Their Security Teams are Prepared for Rising Cyberattacks during COVID-19

Only 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to the rising cybersecurity attacks during COVID-19, according to new research by global association ISACA.  Additionally, only 59 percent say their cybersecurity team has the necessary tools and resources at home to perform their […]

Financial Services Companies Lack Trusted Data to Make Cybersecurity Decisions

Senior security leaders within financial services companies are being challenged with a lack of trusted data to make effective security decisions and reduce their risk from cyber, according to Panaseer’s 2020 Financial Services Security Metrics Report. The results demonstrate myriad issues with the processes, people and technologies required to have a full understanding of the […]

The risk that “no risk” offers pose to your business

By:  Lesley Fair Small businesses and nonprofits should never be on the receiving end of another company’s deceptive practices. An FTC action challenges the methods of companies that allegedly pitch offers for “no risk” business publications and then follow up with hefty bills for unauthorized orders. But it doesn’t stop there. The FTC says if […]

Digital Fraudsters Use COVID-19 Scams to Target Younger Generations

TransUnion released its quarterly analysis of global online fraud trends, which found that the telecommunications, e-commerce and financial services industries have been increasingly impacted.   “Our data showed the opposite with younger generations, Millennials and Gen Z (those born in or after 1995), being the most targeted. Adding insult to injury, our survey found Millennials […]

How to Defend Against Digital Surveillance when Teleworking

As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home. […]

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he’s calling Thunderspy – which targets devices with a Thunderbolt port.   Any time someone requests physical access to your device, whether a laptop, phone, or tablet, there is cause for concern, he says. “Being able to load a malicious payload directly to […]

Panda Security Report: Ransomware & Fileless Attacks are a Growing Concern

The new Panda Security Threat Insights Report 2020 compiled by PandaLabs – anti-malware laboratory and security operations center (SOC)  –illuminates several emerging trends in the cybersecurity space. The Panda Security Threat Insights Report 2020 highlights data compiled by PandaLabs – the anti-malware laboratory and security operations center (SOC) of Panda Security, which has illuminated several emerging trends […]

Are you Ready for These 26 Different Types of DDoS Attacks?

Although distributed denial-of-service (DDoS) is an old school attack vector, it continues to be a serious threat to organizations. Not only is DDoS a way for hacktivists to manifest protest against Internet censorship and controversial political initiatives, but it’s also a goldmine of opportunities for achieving strictly nefarious goals. For instance, the latest tweak in […]