An international team of hackers and traders who benefited from illegal pre-publication access to company finance updates have been charged with fraud.
A breakthrough in e-voting from the University of Birmingham suggests that the old ballot box tradition may come to an end in time for future votes across the UK.
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Tax Identity Theft Awareness Week? Yes, tax ID fraud is a real threat to your finances in America today. Putting your tax refund in jeopardy is just one of the impacts.
Tor has been used to mask the identities of cybercriminals in a significant number of bank frauds for over a decade, according to a US Treasury Department report obtained by Brian Krebs on his Krebs on Security website.
More than a thousand U.S. businesses have been affected by point-of-sale malware – malicious software written specifically for online fraud, to steal information such as credit card details from businesses and their customers.
Ebay’s online ticket resale service Stubhub fell victim to a cyber-scam where a “global gang” used 1,600 hacked accounts on the service and bought and resold tickets, laundering $1m through European banks.
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
Cybercriminals are using online car auctions and photo-sharing services to dupe victims into downloading malware, the FBI has warned. Once infected, the victims are led to fake websites to buy cars – and when they pay up, the criminals vanish.
An international gang of cyber thieves stole $45 million using bank ATMs in a heist spread across 27 countries.
The new ESET blog format must be striking a real chord with people. At any rate, job offers are just pouring in. Except that they don’t seem to be jobs for security bloggers, or for web developers like the team that maintains this site.
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
The United States Attorney for the Southern District of New York filed an indictment against two defendants allegedly involved in an ATM skimming operation that resulted in the loss of over $3 million from 6000 bank accounts.
Detectives from the UK Police Central e-Crime Unit (PCeU) investigating cyber criminals who use “ransomware” have arrested three people. Ransomware is a form of malicious software or malware that is served up by infected websites (which themselves may be legitimate). Victims inadvertently download the software which infects their computer. The scam takes different forms in