The best way to avoid account opening fraud is to detect fraudsters before they can gain access to any account opening processes. Other fraud detection techniques include location analysis, checking for automation vs human etc
Norway and Switzerland become new official members of the J-CAT (Joint Cybercrime Action Taskforce) based within Europol's European Cybercrime Centre (EC3) in the Netherlands.
Learning algorithms are capable of recognising patterns in data and discern fraudsters from legitimate clients by correlating thousands of pieces of information that, most probably, wouldn't be otherwise noticeable to a human.
The stand-out arguments for regulatory intervention in cryptocurrencies are greater consumer protection and more effective financial crime prevention. But do they want the benefits and responsibilities of official recognition?
A Nigerian man pleaded guilty Wednesday in a US Manhattan Federal Court to helping perpetuate business email compromise (BEC) scams aimed at netting millions of dollars.
Cyber-criminals are once again abusing trusted applications, such as Microsoft Office, to launch multi-stage attacks inside malicious documents to deliver Formbook malware.
Thieves are intercepting debit cards in the mail, removing their chips and replacing them with older or invalid ones, and then using the stolen chips when their rightful owner activates the sabotaged card.
A recent spate of attacks using phishing, social engineering, exploits, and obfuscation are being used to spread a Quant Loader trojan capable of distributing ransomware and password stealers.
Malwarebytes has examined a relatively new fake update scam that uses a combination of legitimate websites, a real cloud storage site and social engineering to pass along either a banking Trojan and remote access tool to its victims.
The key to limiting damage is to neutralise the threat before the cyber-criminals have had a chance to monetise that all-important data. Banks spotting customer payment card details on the dark web can suspend those accounts.
UK Home Secretary speech and announcements at CYBER UK Conference: Over £50 million investment pledged for the UK's cyber-defensive capabilities within law enforcement at a national, regional and local level.
News Feature: The cyber threat to UK business 2017-2018 report jointly launched this week by the National Cyber Security Centre (NCSC) and the National Crime Agency(NCA) highlights the extent of the threats faced by the UK.
MalwareHunterTeam has uncovered a simplistic, and almost benign, ransomware that is still under development that requires the victim to play the game PlayerUnknown's Battlegrounds in order to restore the encrypted files.
An unknown hacker exploited a vulnerability in the Verge cryptocurrency platform which allowed an attacker to mine the coin at nearly 1,560 Verge coins (XVG), or about US$ 78 (£55), per second.
Researchers have uncovered a new ATM jackpotting malware program that features a smaller system footprint and a simpler graphical user interface than its typical of its brethren.
A cyberattack against Energy Services Group (ESG), which handles customer transactions for natural gas pipelines owned by several energy firms, has knocked the company's systems offline.
Malwarebytes researchers discovered a weakness in the LockCrypt ransomware which enabled them to recover victim's files.
The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting more than 100 financial institutions worldwide has been arrested in Alicante, Spain.
The US Dept of Justice has charged nine Iranians from the Mabna Institute with stealing more than 31 terabytes of files from US, UK and other universities, companies, government agencies and non-governmental organisations.
Security reserachers have discovered that the Trickbot malware has been updated with you capabilities to evade detection and lock victim's computers.
A relatively recently launched (two years ago) Java-based remote access tool dubbed "Qrypter" is gaining popularity over existing cross-platform backdoors such as Adwind as an efficient Malware-as-a-Service (MaaS) platform.
A 15-year-old security researcher discovered a serious flaw in Ledger cryptocurrency wallets that would allow an attacker to siphon the device's private key and drain a user's cryptocurrency account(s).
A self-proclaimed "mischievous boy" who calls himself "ZENIS" unleashed ransomware attacks that encrypt the files and then purposely deleted the backups.
Cyber-criminals are selling selfies alongside their data dumps on Russian language dark web forums, offering potential buyers more options to exploit victims.
The BKS version 1 keystore files for Bouncy Castle, a collection of cryptographic APIs for C# and Java applications, reportedly contain a weak hash-based message authentication code (HMAC) that can easily be cracked by hackers.
More than 30,000 Pepper and NAO robots used worldwide are vulnerable to ransomware attacks through which cyber-criminals can restrict a business's access to data, impact operations and cause such robots to malfunction.
A pilot of the UK's first police-backed digital certification scheme has been launched the London Digital Security Centre (LDSC) in partnership with Secured by Design (SBD), the national police crime prevention initiative.
With £475 million worth of NEM coins stolen from the Japanese cryptocurrency exchange, Coincheck; and more than 850,000 Bitcoin (valued around £6 billion today) stolen from MT Gox in 2014, cryptocurrencies remain a prime target.
Researcher discovers coin miner that detects and switches off other miners, security tools or intense CPU processes.
Cyber-criminals have taken advantage of blockchain technologies to keep their websites and domains secure from takedown attempts by authorities, selling "dedicated host servers" as hack-proof to other cyber-criminals.