Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But the cybercrime ecosystem is more automated, effective and robust than ever, Trend Micro reports.
The FTC says LifeLock has violated a 2010 settlement by continuing to make deceptive claims about its identity theft protection services. After the FTC made the announcement on July 21, Lifelock's stock value plummeted.
Since 2010, incidents of medical ID theft have nearly doubled, according to research from the Medical Identity Fraud Alliance. MIFA's Ann Patterson tells how healthcare security leaders can reverse this trend.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
A massive breach at the U.S. Office of Personnel Management wasn't discovered by government sleuths - or the Einstein DHS intrusion detection system - but rather during a product demo, a new report says.
Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, medical, financial and professional lives. Because of this, the value of our identities, especially those that can be created from healthcare information is...
How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?
From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports...
A persons PHI can often be so detailed and complete, hackers and fraudsters can refer to it as a "fullz", meaning it contains enough PII to completely take over someone's identity. This makes this information highly valuable to those communities especially as many other types of fraud can also be committed with it....
As data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Over the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works.
Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, financial and professional lives. Because of this, their value is increasing exponentially, thus making their theft far more lucrative. In this opening session...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.