Articles

Articles

The Architecture of an Attack: NuData Breaks Down Account Takeover Attacks

The Architecture of an Attack: NuData Breaks Down Account Takeover AttacksLooking back at the holiday season, merchants faced a timeless struggle: stopping fraudsters. While dealing with fraud is a challenge year-round, the holiday season makes it even more difficult.A common fraud vector used by criminals year around is account takeover. This is when the fraudster gains access to a user’s account, often by using stolen login information or through a brute strength bot attack. In either case, once a criminal

Read More >

Tech firms needs to earn back public trust in order to innovate

March 6, 2020 --Innovations in technologies such as biometrics, cyber security, and artificial intelligence stand to perform an unprecedented, positive role in society. But their development means that we’re being asked to entrust more of our lives to technologies that we don’t fully understand, hand over our data to people we can’t see, and form relationships with businesses we don’t really know.."With an anticipated 50bn internet-connected devices set to be in use by 2025 — ranging from watches and fridges

Read More >

Mastercard: Why A Truly Connected Economy Needs A New Security Paradigm

February 7, 2020 --Flash back a few years and everyone had one or maybe two connected devices.There were the smartphones we all had, with a heavy sprinkling of tablets and connected gaming consoles. One could count a computer, although desktops tend to lack portability.Today, the landscape has changed."The IoT digital explosion is changing everything that happens around us. How we communicate, how consumers buy products, how they watch content, how they find things — this literally touches every aspect of

Read More >

Attacks are getting smaller. In some ways that’s worse.

January 15, 2020 -- Attackers are adapting and evolving to give themselves the best chances for success when they commit account takeover or other fraudulent attacks, often attempting to work around bot-detection tools to enable greater efficiency with automated attacks."Sophisticated bot-detection tools, improved Captchas, and other technologies that mitigate automation are making it very difficult for bad actors to succeed in their schemes, forcing them to look at foolproof alternatives that bypass these bot challenges, particularly when targeting high-value accounts

Read More >

Stolen data’s a hot potato that gets quickly passed around

December 13, 2019 -- In the digital economy, data has become the most valuable asset for any organization, with 97% of businesses using data to power their business opportunities and 76% of businesses using data as an integral part of forming a business strategy."Through step-ups such as one-time passwords, two-factor authentication, security tokens, and physical biometrics, companies are finding alternatives to avoid relying on a password or other personally identifiable data that could have been stolen." For the complete article,

Read More >