Takes Gold for “Innovative Company of the Year” and for “Integrated Security (Software) Innovation” at the 2014 Golden Bridge Business Awards The ThreatMetrix TrustDefender Cybercrime Protection Platform brings home the gold at the 6th Golden Bridge Awards, an annual industry and peers recognition program honoring the best companies in every major industry from all corners of the globe. And organizations from all over the world are eligible to submit nominations. Forty judges selected the winners More than forty judges from a broad spectrum of industries…

U.S. House of Representatives Passes Bill That Comes Down Hard on Tax Return ID Thieves Who says Congress doesn’t do anything? Well just about every American of voting age (Headline from August 2014 on politico.com: Poll: Congress approval hits new low). Could the House passing H.R. 744 be a portent of things to come? Maybe, but it would be kind of like Apple donating the gross sales for iPhone 6 to charity. In any case, if the bill passes the Senate and is signed by…

ThreatMetrix Explores the Pros and Cons of iPhone 6 as They Relate to Privacy and Cyberfrauds’ Shift to Online Channels When it comes to security, do the “I”s have it? ThreatMetrix takes a hard look at iPhone 6 and iPhone 6 Plus, exploring whether some of their newest features will be making their owners more secure or bigger cybercrime targets. (For a quick overview, ThreatMetrix prepared the following infographic on iPhone 6 and iPhone 6 Plus cybersecurity pros and cons.) “The most recent iPhone has…

Law Applies to All Companies Doing Business in Europe The European Union’s updated data protection law requires any business that suffers a data breach involving personal information to alert regulators and directly notify affected individuals “without undue delay.” What makes a delay an “undue delay”? Could there be some legal wiggle room? In his article on bankinfosecurity.eu (link to article), Mathew J. Schwartz cites security expert Jacky Wagner, managing director at the consultancy PricewaterhouseCoopers, observing that current EU laws “don’t have any explicit requirement around…

…Not the 18 Companies Creating Anti-Malware for It Okay, compared to attacks on Windows and Android operating systems, there are a lot fewer Mac attacks. Not exactly news. And the reason why is also not news. With fewer devices running OS X rather than Windows or Android, it just makes sense hackers would look for targets with better returns. Every day, independent test lab AV-TEST.org captures more than 400,000 new malware samples for Windows and 5,000 new samples for Android compared to less than 100 per month…

Company Offers Insurance Against Losses from Socially Engineered Scams In the U.S. Army, they used to call it the 10 percent — the 10 percent who didn’t get it no matter how often something was explained. Don’t click on a link in an email because the email appears to have come from the company’s bank. Don’t provide passwords and other private information to disembodied voices on a phone just because they say they’re IRS agents. Don’t click on a website’s URL unless you’re certain it’s…

ThreatMetrix’s Latest Infographic Analyzes the Security Pros and Cons of iPhone 6 and iPhone 6 Plus, Apple Pay, Passbook and Much More By the time people get around to singing auld lang syne (or trying to), some 25 million iPhone users will have upgraded to iPhone 6 and iPhone 6 Plus (according to comScore) with all kinds of new features and capabilities. You might like to check the review on techradar.com. When it comes to security, like most new technologies, Apple’s latest products and services…

Andreas Baumhof, Chief Technology Officer and Alisdair Faulkner, Chief Products Officer to Present at Information Security Media Group (ISMG) Annual Fraud Summits in Toronto, London and NYC ISMG’s fraud summits will take place in Toronto on September 17th, London on September 23rd and in New York on October 21st. At the Toronto summit, Andreas Baumhof will speak on the “Real World Applications of Big Data Analytics – Social Network Analysis and Post Breach Fraud Detection” panel focusing on how big data is being used to…

September 9, 2014

Who Gets Stuck with the Bill?

Utility Sues Bank When Cybercriminals Raid Utility’s Bank Account If something sounds oddly familiar about this story, it’s because you’ve likely heard it before. However, the last chapter comes out differently with each telling. The epilogue? That may end up being written by the U.S. Supreme Court. But, we’re getting ahead of ourselves. In July, TEC Industrial Maintenance & Construction, a utility, sued TriSummit Bank, alleging the bank was to blame for a series of fraudulent payroll drafts sent from TEC’s account in 2012. TEC…

In the Last 5 Years, 944 Major Health Breaches Affected 30.1 Million Patients The U.S. Department of Health and Human Services (HHS) defines a major breach as one that affects at least 500 people. So NOT included in the 30.1 million patients are, for example, the 165,135 patients in 21,194 smaller breaches (that’s only for 2012). Also not included were the 4.5 million patients affected by the recent Community Health Systems data breach.Hey, but who’s counting? Usually this is a snide rhetorical question. But in…

…And That’s Just This Week. Google Rolls out Safe Browsing Tech to Be Available on Chrome, Firefox and Safari Google has expanded its safe browsing technology to ID even more types of malicious software. With the new technology more than 3 million warnings will be shown per week with very few false positives. According to Zach Miners on computerworld.com (link to article), the company is honing in on downloads that claim to be helpful, but end up switching the user’s homepage or other browser settings.…

Hint. It’s Not the UK, Which, Overall, Lost the Most Money to Fraud than any Other European Union Member. Okay, so maybe we won’t get a gig writing questions for Jeopardy. However, we do have some unsettling answers. Based on data released by the global market intelligence firm, Euromonitor, an article on paymentmagnates.com (link to article) points out that, rather than causing fraud to fall, the adoption of PIN and chip cards in the EU will cause fraudulent activity to rise — especially in the…

The ThreatMetrix TrustDefender Cybercrime Protection Platform’s Location Detection Capability Maintains Business Compliance with OFAC Regulations The United States Treasury’s Office of Foreign Assets Control (OFAC) regulations prohibit American corporations from doing business with embargoed or restricted countries or entities. The problem is it’s often difficult for businesses such as banks to discover customers’ true locations. Heavy fines for infractions Maintaining privacy and protecting personal data might be legitimate reasons for some companies to disguise their locations. However, using proxy servers, TOR network, etc, cybercriminals intentionally…

September 2, 2014

What’s on Your Wallet?

It Could Be an iPhone Logo. Apple, Visa, MasterCard and American Express Partner on New iPhone Mobile Wallet Apple’s newest iPhone will include a near-field communication chip. If you’re not familiar with it, the chip establishes a radio communication with another device by touching it or being in close proximity, usually no more than a few centimeters away. The chip in conjunction with Touch ID, the fingerprint recognition reader that first became available on the most recent iPhone, will make it possible for consumers to…

September 1, 2014

You Can Never Start Too Early

Camp Prepares 9th to 12th Graders for Cybersecurity Threats With some hackers not yet out of their teens before they’re into cybercrime, it makes sense that there would be a camp for high school students to learn about online threats. Seventy-five teenagers in one Virginia county are getting that opportunity in the Marshall Academy’s third annual camp. In her piece on fairfaxtimes.com, Kate Yanchulis outlines what the camp is like and what the students learn, including how to avoid hackers and handle cyberbullying. The following…