$40.2 million reminder about the importance of due diligence and monitoring


Companies that deceive consumers often don’t act alone. Pull back the curtain and you may find behind-the-scenes businesses that lend a hand. The FTC alleges that Atlanta-based First Data Merchant Services and its former vice president, Chi “Vincent” Ko, engaged in conduct that helped scammers rake in megabucks at consumers’ expense. The $40.2 million total proposed settlement should warn other companies of the hazards of looking the other way when fraud stares you in the face.

Read the entire article here.

Learn more about this Houston private investigator’s company and their corporate services.

NIST Study Measures Performance Accuracy of Contactless Fingerprinting Tech

The National Institute of Standards and Technology (NIST) has evaluated several commercially available contactless fingerprint scanning technologies to compare their performance.
The results of the study, published as NIST Interagency Report (NISTIR) 8307: Interoperability Assessment 2019: Contactless-to-Contact Fingerprint Capture, show that devices requiring physical contact remain superior to contactless technology at matching scanned prints to images in a database.

Read the entire article here.

51% of Organizations Say Their Security Teams are Prepared for Rising Cyberattacks during COVID-19

Only 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to the rising cybersecurity attacks during COVID-19, according to new research by global association ISACA.  Additionally, only 59 percent say their cybersecurity team has the necessary tools and resources at home to perform their job effectively.

Read the entire article here.

Financial Services Companies Lack Trusted Data to Make Cybersecurity Decisions

Senior security leaders within financial services companies are being challenged with a lack of trusted data to make effective security decisions and reduce their risk from cyber, according to Panaseer’s 2020 Financial Services Security Metrics Report.
The results demonstrate myriad issues with the processes, people and technologies required to have a full understanding of the organization’s cyber posture and the preventative measures required to stop a security control failure from becoming a security incident.

Read the entire article here.

The risk that “no risk” offers pose to your business

Lesley Fair

Small businesses and nonprofits should never be on the receiving end of another company’s deceptive practices. An FTC action challenges the methods of companies that allegedly pitch offers for “no risk” business publications and then follow up with hefty bills for unauthorized orders. But it doesn’t stop there. The FTC says if a business refuses to knuckle under to payment demands, the defendants turn the account over to a debt collector, whom the FTC also has sued. Notably, the defendants have received warnings about their practices for years.

Read the entire article here.

Digital Fraudsters Use COVID-19 Scams to Target Younger Generations

TransUnion released its quarterly analysis of global online fraud trends, which found that the telecommunications, e-commerce and financial services industries have been increasingly impacted.
“Our data showed the opposite with younger generations, Millennials and Gen Z (those born in or after 1995), being the most targeted. Adding insult to injury, our survey found Millennials are being financially challenged the most during the pandemic.”

Read the entire article here.

How to Defend Against Digital Surveillance when Teleworking

As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.

COVID-19 is a global crisis that we’ll be dealing with as a society for some time to come. But by being smart about how we adapt to this new world of fully remote work, we can minimize the headaches for ourselves and our coworkers. Stay safe out there.

Read the entire article here.

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he’s calling Thunderspy – which targets devices with a Thunderbolt port.
Any time someone requests physical access to your device, whether a laptop, phone, or tablet, there is cause for concern, he says. “Being able to load a malicious payload directly to the device bypasses many security tools with the attacker leaving no trace of meddling with the device.

Read the entire article here.

Panda Security Report: Ransomware & Fileless Attacks are a Growing Concern

The new Panda Security Threat Insights Report 2020 compiled by PandaLabs – anti-malware laboratory and security operations center (SOC)  –illuminates several emerging trends in the cybersecurity space.

The Panda Security Threat Insights Report 2020 highlights data compiled by PandaLabs – the anti-malware laboratory and security operations center (SOC) of Panda Security, which has illuminated several emerging trends in the cybersecurity space. The report analyzed 14.9 million malware events in 2019, stopping 7.9 million Potentially Unwanted Programs (PUPs), as well as 76,000 alerts for exploits

Read the entire article here.

Are you Ready for These 26 Different Types of DDoS Attacks?

Although distributed denial-of-service (DDoS) is an old school attack vector, it continues to be a serious threat to organizations.

Not only is DDoS a way for hacktivists to manifest protest against Internet censorship and controversial political initiatives, but it’s also a goldmine of opportunities for achieving strictly nefarious goals. For instance, the latest tweak in this epidemic is what’s called “ransom DDoS,” a technique used to extort money from organizations in exchange for discontinuing a massive incursion.

Read the entire article here.