Blog Archives

Cyberlitica – 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
Create a Repository of the Stolen Data

Hackers start by taking an inventory of what was stolen. They will look through the stolen data files for the victim’s authentication credentials,

Read more ›

Posted in Cybersecurity, Fraud, Hacks
Tags: , , , , ,

Fighting Cybercrime

Cybercrime and Digital Forensic Investigation: A Winning Combination

by Suhali Nanji, Area Director Southeast Region, SMLR Group, Inc.

Cyber insurance is one way organizations can fight cybercrime. Behind the scenes, however, laws and sentencing are getting tighter in response to the rise in cyber-attacks, while experts are creating more precise ways to identify cyber criminals.

Read more ›

Posted in Cybersecurity, Financials, Forensic Social Media, Fraud, Hacks, Incident Response, Legal, Malware, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , , , , , ,

Are ‘Smart Credit Card’ Terminals Really More Secure?

Are Smart Cards Really More Secure… or Just Distracting from the Problem?

Chip-enabled “smart” credit cards are supposed to be the solution to mass theft, preventing the kinds of attacks recently launched on Target, Michaels and Neiman Marcus customers.

But smart cards are no good if the shop’s point-of-sale devices are dumb.

Read more ›

Posted in Content, Cybersecurity, Malware, Oops, Regulatory, Risk Management
Tags: , , , , , , ,

Was eBay’s Breach Response Sufficient?

Consumers, Security Expert React in Different Ways to Breach Response
By Eric Chabrow, July 18, 2014.Follow Eric @GovInfoSecurity

William Hugh Murray quit using eBay – and sold the stock he owned in the company – because he feels the online retailer didn’t do enough to safeguard personally identifiable information before it was breached this past winter.

Read more ›

Posted in Breach, Customer Engagement, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

Vendor Compliance: The Untold Security Threat

Retailer discloses that attackers stole credentials from vendor to break into its network

January 30, 2014 — CSO — Target’s disclosure that credentials stolen from a vendor were used to break into its network and steal 40 million credit- and debit-card numbers highlights the fact that a company’s security is only as strong as the weakest link in its supply chain.

Read more ›

Posted in Breach, Compliance, Cybersecurity, Fraud, Governent Oversight, Hacks, Incident Response, Insider Threats, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , , , ,

Target Data Breach: The Fallout Ramps Up

Senators Call for Hearing on Data Security in Wake of Target Data Breach

Posted by Katherine Gasztonyi on December 31, 2013 for InsidePrivacy

A number of investigations and inquiries, including a call for a hearing in Congress on December 30, 2013, have been sparked by the announcement by Target Corp.

Read more ›

Posted in Breach, Compliance, Content, Cyberattack, Cybersecurity, Hacks, Legal, Malware, Phishing, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , , , ,

Target Breach: What Happened?

Expert Insight on Target Breach Scenarios, How Banks Must Respond
By , December 20, 2013. Follow Tracy @FraudBlogger

Was it a point-of-sale attack? A network breach? Or was it an inside job?

Security experts offer varying opinions about how U.S.

Read more ›

Posted in Breach, Cybersecurity, Financials, Fraud, Insider Threats, Oops, Risk Management
Tags: , , , , , ,

Target Data Breach: 40 Million Cards at Risk

Investigation Into Retailer’s Breach Launched
By , December 19, 2013. Follow Tracy @FraudBlogger

Target Corp. confirms that a network intrusion may have exposed approximately 40 million debit and credit accounts. U.S. point-of-sale transactions conducted between Nov.

Read more ›

Posted in Breach, Cybersecurity, Financials, Governent Oversight, Oops, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , ,

Why ATM Fraud Losses Will Surge

Even Nations With EMV to Experience Fraud Uptick
By , December 2, 2013.Follow Tracy @FraudBlogger

For months, experts have warned about upticks in global card fraud as U.S. banking institutions gear up for rollout of EMV chip cards.

Read more ›

Posted in Cybersecurity, Fraud, Hacks, Legal, Risk Management
Tags: , , , , , ,

Skimming Lawsuit Against Barnes & Noble Dismissed

In Barnes & Noble skimming case, federal judge dismisses plaintiffs’ class-action suit


A federal judge in Illinois has tossed a class-action lawsuit against Barnes & Noble, after plaintiffs failed to demonstrate loss or injury as a result of a PIN pad tampering incident last year.

Read more ›

Posted in Breach, Content, Cybersecurity, Legal, Malware & Other Threats, Privacy, Regulatory
Tags: , , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: