Fraud

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

Security investigator confronts Wipro on breach incident during investors’ call

Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.

2FA and telco vulnerability allows criminals to hack email accounts, reveals security researcher

When you forget your Gmail password, and have two factor authentication (2FA) enabled, Google will SMS or call you with a six to eight digit code. You enter the code (Google calls this 2-step verification) and gain access to your account.

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

Darknet market bundling card details with device fingerprints to beat fraud detection

Researchers have uncovered an invitation-only Tor-concealed marketplace where stolen credit card details are bundled with the victim's device fingerprint, meaning criminal buyers can use them to beat numerous fraud detection systems.

Xero invoices mimicked in email scam

A fresh round of hoax invoice notifications claiming to be from Xero have landed in user inboxes, as the cloud accounting provider once again falls foul of cyber criminal impersonators.

Game of threats: Cybercriminals uses TV show disguises to spread malware

Kaspersky Lab finds that out of all the TV show disguises that’s used to distribute malware, Game of Thrones tops the list in 2018 and 2017.

Ola CISO Mohd Shadab Siddiqui quits

Mohd Shadab Siddiqui was the head of information security, fraud, risk and compliance at Ola (ANI Technologies).

Behavioral analytics - The key to fight against cyber threats

The key to better security lies in adopting a differentiated human-centric approach to cybersecurity, where people—rather than IT infrastructure—become the new perimeter. 
 

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

Quantum computing will break your encryption in a few years

Quantum technology is set to make public-key infrastructure obsolete before too long, but it might also keep your data secure.

Cyber criminals increasingly favouring 'low and slow' stealth attacks

A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.