ThreatMetrix Takes Home More Awards! Wins 3 Bronzes and Is Honored by the Info Security Products Guide at RSA During RSA, the security industry honored some of the best companies, executives and products in the world with Info Security Products Guide 2015 Global Excellence Awards. Winner in 3 Info Security Products Guide 2015 Global Excellence Awards’ categories ThreatMetrix took Bronzes for the Most Innovative Security Software (Product) of the Year, Most Innovative Company of the Year (Security), and Innovation in Enterprise Security. Other honors ThreatMetrix received in…

April 24, 2015

iGad!

iOS Vulnerability Discovered by Researchers Could Let an Attacker Crash Any iPad or iPhone within Range of WiFi Hotspot Researchers discovered an iOS vulnerability that turns WiFi into Why Me!!! Now imagine you’re strolling past a WiFi hotspot without a care in the world except how to pay your monthly iPhone bill. Well no worries. The mere act of walking past the WiFi hotspot could solve that problem because, say researchers, that’s all it’ll take to turn your iPhone into a doorstop. In his piece…

April 23, 2015

TIGTA Gives IRS an F

TIGTA (Treasury Inspector General for Tax Administration) Gives the IRS Poor Marks for Handling ID Theft Victims A recently released Treasury Inspector General for Tax Administration report says the IRS tells an ID theft victim that his/her case will be resolved in 180 days. While that’s what the IRS claims, the TIGTA report says it actually takes the IRS 278 days. Imagine what a victim of ID theft goes through having to wait those additional 98 days. In his piece on theblaze.com, Fred Lucas describes…

ThreatMetrix Wins 2015 Cyber Defense Magazine Awards for Best Anti-Malware Product and Hot Company in Multi-Factor Authentication The awards, which Cyber Defense Magazine confers on companies for the best ideas, products and services in the information technology industry, are being announced at the RSA Conference 2015 in San Francisco. Unveiled at RSA: the ThreatMetrix Digital Identity Network, world’s largest Leveraging global shared intelligence to safeguard online customer identities, the ThreatMetrix Digital Identity Network creates an anonymized digital identity of consumers based on device, persona and…

April 21, 2015

Watch Out!

5 Apple Watch Security Questions That are Causing Enterprise Security Pros to be Concerned Apple Watch is hot. Not hot as in stolen, but hot as in hot. The Watch word is that it’s been sold out in preorders. Umm. You don’t think Tim Cook went out and ordered a couple of thousand? That’s what some book publishers did back in the day (after dinosaurs but before the Internet) when they wanted to get a book on The New York Times bestseller list. They’d find…

Leveraging Global Shared Intelligence, the ThreatMetrix Digital Network Protects Customer IDs Online Now being showcased at the RSA Conference in San Francisco (April 20-24) is the ThreatMetrix Digital Identity Network. As the world’s largest, the ThreatMetrix Digital Identity Network advances identity protection through a persona-based profile that safeguards consumers’ information, protects businesses against fraud and creates a strong digital assessment on a truly global basis. All aspects of a person’s online devices and behavior in one unique digital identity Including email addresses, geo-locations, devices and…

AT&T Fined for Breaches in Mexico, Colombia and the Philippines Exposing 279,000 U.S. Customers’ Names and Full or Partial SSNs The Federal Communications Commission reported that more than forty employees at three contract call centers in Mexico, Colombia and the Philippines sold customer information to criminals who used it to unlock stolen smartphones. In Grant Gross’s story on computerworld.com, he interviewed a number of security professionals who thought the punishment did not fit the “crime” including an attorney who questioned why the FCC, rather than…

Protection Beyond Encryption: ThreatMetrix Strategies for Preventing Cybercrime in Healthcare and Other Industries ThreatMetrix observes that the Anthem and Premera data breaches that exposed tens of millions to fraud, ID theft and other crimes could have been prevented through the use of real-time digital identity intelligence. Hacking healthcare is relatively easy and highly profitable Stolen health credentials can sell for $10 apiece on the black market or around 10 to 20 times what a U.S. credit card number goes for. Between them, in just the…

The Annual Report of the Internal Revenue Service’s Criminal Investigation Division Shows Progress against a Host of Crimes The Criminal Investigation Division or CI had staff reductions of 11 percent, putting it at 1970 staffing levels. Despite that, the annual report notes that CI has made progress in fighting ID theft, international tax fraud, tax return preparer and questionable tax refund fraud, public corruption, Bank Secrecy Act violations, money-laundering investigations and terrorist-financing cases. In his article on accountingtoday.com, Michael Cohn relies on the annual report…

In our last ThreatMetrix Labs report, we discussed the Superfish Adware in detail together with its implications on the security ecosystem. After the public outrage about this Threat and the fact that Lenovo pre-installed this Adware on many laptops, we wanted to revisit the occurrance of the Superfish Adware in our Global Trust Intelligence Network to see whether the various uninstall tools provided by Lenovo itself and many Antivirus Engines were able to reduce the outbreak of this adware. We are happy to see that after…

Why Don’t Data Breaches Drive Down Stock prices? Maybe we should begin with a disclaimer. Okay, if you didn’t already know it (and chances are you did), the stock market is about as logical as a game of Russian roulette with an automatic pistol (Too violent?) How about a game of badminton with a bowling ball? The point is, while the market makes some people dollars, it doesn’t always make a whole lot of sense. A recent example is the sharp drop in the price…

  ThreatMetrix Outlines a New Approach in Line with FFIEC’s Joint Statements on Authenticating Customers and Employees The Federal Financial Institutions Examination Council (FFIEC) has released joint statements dealing with stolen identities and malware that, combined, represent a threat not only to business, but to the entire financial system. Alisdair Faulkner, ThreatMetrix chief products officer, on a new approach to authentication “We’re not even halfway through the year and we’ve already seen data breaches of two major healthcare providers, Anthem and Premera, compromise the information…

418,640 Arizonans Had Data Compromised in the Anthem Breach That Affected 80 Million. ThreatMetrix CEO Calls Breach the “Tipping Point.” In his blog, The Anthem Tipping Point, Reed Taussig, President and CEO of ThreatMetrix® notes that the Anthem Breach might finally be the cataclysmic event, the tipping point, that gets “the attention of senior management and boards of directors to recognize that cybersecurity is just as important to the enterprise as the operations of their customer-facing Internet applications themselves.” And Anthem was not the only…

ThreatMetrix Warns Merchants of a Hike in Online Fraud and Banks about an Upsurge in Fraudulent Account Creation Just months away (October 2015), Europay-MasterCard-Visa (EMV) will become the new standard for credit cards in the USA. To criminals, the adoption of EMV means two things. One is that it’s going to be harder to hack in-store point-of-sale (PoS) systems. The second is that they’re going to be looking for “softer” targets and shifting their focus to online retail fraud and the creation of fraudulent accounts…

The latest official UK fraud figures for 2014 are out and once again it doesn’t make for particularly pleasant reading. The most obvious ongoing trend they point to is the unfettered growth of card not present and online banking fraud – the latter soaring a whopping 48% to reach losses in excess of £60 million. With the bad guys continuing to go after the lowest hanging fruit, businesses need to assume that traditional identity data has already largely been compromised. The fight back must begin…