HTTP vs. HTTPS: How one letter can make a difference
You probably overlook it, and yet that letter protects your data every day.
You probably overlook it, and yet that letter protects your data every day.
You reuse passwords, add exclamation marks to them, and are confident you won’t be hacked. Have a seat, we’ve been waiting for you.
Cyber fraud is a catch-all term for endless schemes to fool users into giving assets access to their data or information. Each ploy has its own personality and tools. Today we take a closer look.
Let’s be honest, most Black Friday and Cyber Monday purchases this year will happen from our sofa. And fraudsters will be sitting right next to us. These are some of their latest tricks, so that [...]
“Car.” “Chris.” “Lizard.” Online accounts with one-word names like these are known as “OG usernames,” and they’re prime targets for bad actors who steal, buy and sell access on a lucrative black [...]
Online fraud can be pretty insidious, especially if you think you’re doing everything right. But fraud is becoming more sophisticated and the bad guys know technology.
Few would disagree that 2020 has brought its challenges – and I would like to know who those few are. nudata analysts closely monitor our data for online patterns and trends, and found some [...]
It is no secret that account takeover has reinvented itself several times in the last decade, from dumb automation to human-looking behavior. Today, we are witnessing the ultimate twist: a [...]
Online fraud isn’t just the work of some teens in their parents’ basements. Most hackers are well-trained professionals employed by a specialized industry. Learning how these workers think is the [...]
As the European PSD2 regulation rolls out, more online payments will follow Strong Customer Authentication (SCA) requirements for better security. This doesn’t have to impact the customer experience.
When fraudsters use websites to run a batch of credit cards to find valid ones, it costs you more than a sale. The long-term effects can damage your reputation with customers and issuers.
When a simple request from a trusted person becomes fraud.
Life is being reshaped by lockdowns and social distancing, but online activities are changing just as fast.
In the past year, among the many brands that made the headlines we have Macy’s, Marriott and other Starwood Hotels, and Kay Jewellers. These companies have something in common, and it is not the [...]
Both retailers and cardholders are falling prey to triangulation fraud, involving an unscrupulous intermediary of which neither are even aware.
If you were asked who the world’s first computer programmer was, who do you imagine? Would you be surprised to learn that it was a woman?
While enterprises try to determine how to boost their cybersecurity, adding independent security blocks, fraudsters are developing their next steps to stay ahead of detection. CARTA, an approach [...]
With the issuance of Strong Customer Authentication (SCA) guidelines under PSD2, nudata staff are often approached with questions about the impact of these regulations on the market as a whole.
nudata’s flagship product suite, NuDetect, has achieved the coveted AWS PrivateLink Ready designation, making nudata’s technology available through AWS PrivateLink and fully supported for AWS [...]
We’ve got a lot of work ahead of us before we solve the issue of asserting a consumer’s true offline identity in online interactions.
Your online company is getting lots of new online customers, but you don’t understand why revenue numbers don’t add up. OAO is probably at the source of your problems.
More than 17,000 domains have been successfully hit by Magecart attacks and attackers keep evolving the malware in an effort to steal credit card information on the web.
It is with deep shock and sadness that we must share that Ryan Wilk and his wife Elsa passed away following a tragic accident whilst on holiday with their family.
With 97% of attacks coming from an anomalous device or network, devices have the power to uncover most of today’s threats – if used right.
“Studying alone wasn’t going to cut it; the employers you really want to work for look for people who’ve gone out and done something alongside their studies”.
The Center for Identity at the University of Texas, has observed 5,398 cases of identity theft, fraud and abuse in the U.S. since the year 2000. The majority of those cases occurred in the states [...]
The definition of account takeover (ATO) or account takeover fraud is obtaining a legitimate user’s details to take over their online accounts, possibly enabling monetary or credit card theft. [...]
Authentication is at the heart of modern banking – as it should be. As companies transact more and more online, the ability for them to grant users quick, secure, and frictionless access to their [...]
When many hear the term “human farm” they think of The Matrix’s human power plant, where, as anyone with a sci-fi-loving bone in their body knows, the machines grow humans as batteries to provide [...]
It used to be that the first thing to do with a stolen credit card is to go on a shopping spree but times have changed. Both brick and mortar stores and online retailers are getting increasingly [...]
Man-in-the-middle is a type of attack used by spy organizations and professional criminals alike to bypass passwords, steal login information, record private messages, move funds. Find out more [...]
Risk-based authentication process applies varying levels of strictness to the authentication process based on the probability that a given application can be compromised. The authentication [...]
Applying for new products, often credit cards, bank accounts, loans, tax rebates using somebody else’s stolen identity. Costs the financial sector millions each year.
How it works
[gravityform id=”1″ title=”true”]