Posts

Rooted Android

Rooted Devices: It’s Not the Device That’s the Problem

Rooted AndroidThe E-Commerce & Financial Services Conundrum If you’re an online merchant or a bank and a customer shows up to your website with a rooted device, this is the equivalent of ringing a huge alarm bell for fraud management teams, and as a result, most sane fraud/risk managers will decline that transaction without hesitation. However, as the saying goes, where there is a risk, there is an opportunity. Putting the concepts of mobile phones and rooting together is not something

Read More >

Fraud puzzle concept

The future of fraud detection, pt. 2

Fraud puzzle conceptIn an earlier blog, we talked about how user behavior analytics are a key part of the future of fraud detection. However, caution is advised. Any time that a new technology starts garnering attention, it can be presented as a silver bullet solution. The same is true for the evolution of UBA – there is more to it than meets the eye. While yesterday’s security concepts used rules and signatures to prevent “bad” occurrences, today we need to look under

Read More >

Future of Fraud

The future of fraud detection, pt. 1

Future of FraudThe key to defeating fraud is to give you the power to confidently answer this fundamental question: “Is this person really who they say they are?” That’s precisely what User Behavior Analytics (UBA) does, and that’s why it’s the future of fraud prevention. Once a cutting-edge technology, UBA has now entered the mainstream, with some of the largest companies in the world using this technology to secure their websites from fraud, brand attacks, account takeovers and bad behavior from their

Read More >

Devalue that data

Hey, you can devalue that!

Devalue that dataHey, you can devalue that!There’s a pretty simple reason for why cyber theft continues to proliferate: it’s lucrative. A report released last year by PwC, titled “Managing cyber risk in an interconnected world: Key findings from The Global State of Information Security® Survey 2015” looked at the going rates for Personally Identifiable Information (PII). A complete “kit” of comprehensive information could fetch as much as several hundred dollars, health insurance credentials alone could fetch $20 a pop. And of course,

Read More >

hacker

(Don’t Fear) the Breacher

hacker(Don’t Fear) the Breacher.With all the news of data breaches we’re continually exposed to, it’s no wonder the ecommerce and financial industries have a serious fear of the breacher. In fact, more than 700 million consumer records were exposed to fraudsters in 2015 alone, according to the Gemalto Data Breach Level Index. That’s a huge number. That stolen data is then being used to perpetrate more crime, and it can often feel like a never-ending cycle. Account takeover and new

Read More >