article thumbnail

North Korea’s Laptop Farm Scam: ‘Something We’d Never Seen Before’

Tech Republic Security

Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American companies and steal corporate data.

Scams 98
article thumbnail

Australia’s Banking Industry Mulls Better Cross-Collaboration to Defeat Scam Epidemic

Tech Republic Security

The ACCC has given the green light for cross-banking collaboration to address scams. Here’s how IT pros in Australia can and should address the current regulatory environment.

Banking 148
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Avoiding Tax Scams in 2022

Approachable Cyber Threats

Here are some of the scams we see most frequently, and some of the quick tips for avoiding them: Scammers impersonate tax officials to trick you into giving them your money and data. Phishing remains the leading cause of big data breaches. Why should I care about tax scams? Some tax scams happen at the office.

Scams 97
article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The increasing trend of using mobile payments for in-store purchases (especially during the pandemic) is leading criminals to increasingly focus their efforts on defrauding people through online fraud and scams. Fraud and scams move to the web. Big Data and EMV 3DS. Data security. Data Breach. Encryption.

Banking 143
article thumbnail

HUSH – THIS DATA IS SECRET

CyberSecurity Insiders

Is There Ever Too Much Data? As a security practitioner, you know that businesses are fuelled not only by people but by data. Years ago, the phrase “Big Data” was a new, innovative way to gain a business advantage. Now, big data is the norm. This is a new level of ransomware meets blackmail.

article thumbnail

Top 5 Risks of Artificial Intelligence

IT Security Guru

Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Threat actors can leverage the same AI tools meant for human good to commit malicious acts like scams and fraud.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Phishing scams, malware, ransomware and data breaches are just some of the examples of cyberthreats that can devastate business operations and the protection of consumer information. While she enjoys tackling topics across the technology space, she’s most passionate about educating readers on cybersecurity and Big Data.

Hacking 140