Fraud

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

The top 3 disruptive FinTech technologies to watch in 2018

FinTech will benefit from three technologies that are expected to expand the usefulness of big data, offer more secure and responsive applications and exponentially grow computational performance.

How UK antifraud startup Ravelin courts enterprise customers

A four-year-old London startup that builds anti-fraud software using machine learning is rapidly scaling up from selling to fellow startups into the enterprise space. Computerworld UK sat down with one of the founders of Ravelin to discuss its technology and how it sells into that fundamentally different market.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.

GDPR’s breach-reporting mandate can prove to be a challenge: Jaspreet Singh, EY

At IDG Security Day, Jaspreet Singh, Partner – Cyber Security (Africa, India & Middle East) at EY, decodes GDPR and points out areas that could prove to be a challenge.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

Fortinet signs threat information sharing agreement with INTERPOL

While the agreement formalizes the cooperation between Fortinet and INTERPOL, both organizations have been operationally collaborating for over two years.

Why is Bitcoin such a security hazard?

Despite the promise of Blockchain technologies to bring better security to online transactions and business processes, its rapid growth and adoption is bringing new cyber risks with equal force that will likely evolve with continued success.

Amit Vijay Ghodekar

Amit Vijay Ghodekar led the implementation of deception technology along with unified security at Motilal Oswal Financial Services. Under the new security strategy, intelligence generated from Anti-APT Solution and server security solution were integrated with products like ant-virus, anti-malware, and MDM along with deception technology.

Subhash Kumar Mishra

At Tata SIA Airlines (Air Vistara), Mishra implemented security measures—physical measures that protect premises, as well as logical controls that restrict access based on business needs— to provide robust controls around physical and logical access.