Blog

July 5, 2016
Comments [0]

By Roger Yu

In July 2015, a hacker who goes by the name of Phineas Fisher breached an Italian technology company that, ironically, sells spying and hacking software tools.

Fisher exfiltrated more than 400 gigabytes from the company, called Hacking Team, and declared that his motive was to stop its “abuses against human rights.”

“That’s the beauty and...

Read More
June 29, 2016
Comments [0]

By Roger Yu

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach.

How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance?

Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies...

Read More
June 27, 2016
Comments [0]

By Constance Brinkley-Badgett

Phone scammers often pretend to be debt collectors, election or IRS officials — heck, they’ve even pretended to be you calling you to scam yourself. Now they’re pretending to be the FBI in hopes of swindling you out of some cash and possibly your personal information as well.

The FBI’s Philadelphia field office issued a warning Wednesday saying a phone scam that...

Read More
June 21, 2016
Comments [0]

If you purchased something on computer manufacturer Acer’s website over the last year, your credit card information may have been stolen.

Hackers made off with the names, addresses, card numbers, expiration dates and three-digit security codes of a reported 34,500 customers. So far, there is no reported evidence that usernames or passwords were compromised during the unauthorized third-party access.

... Read More
June 14, 2016
Comments [0]

How prepared are you to deal with cyber threats? Is your organization’s email security sophisticated enough to detect and deflect the best spear-phishing or whaling attacks? Do you feel confident you are safe—or as safe as you can be?

The answers to these questions often are torn between your perceptions of security and the reality of it. This gap between the two exposes some major vulnerabilities, ranging from how much of an...

Read More
June 13, 2016
Comments [0]

By Jill Krasny

With the 2016 Summer Olympics just around the corner, scammers are getting busy with various schemes to dupe fans.

Here are some of this year’s Olympics scams to watch out for.

Phishing Attacks 

It’s the old-school scam in an unfamiliar package, this time masquerading as an email that appears to be the original marketing...

Read More
June 11, 2016
Comments [0]

By Brooke Niemeyer

Facebook CEO Mark Zuckerberg apparently didn’t read the warning about using different passwords to protect online accounts.

Sources told The Wall Street...

Read More
June 7, 2016
Comments [0]

It’s a sad reality: when military personnel are away for long periods, criminals often target their identities.

Compared to the rest of consumers, military personnel experience, “28 percent higher rates of new-account fraud and 18 percent higher rates of familiar fraud,” according to Javelin Strategy & Research. New account fraud happens when someone obtains new credit using your personal information. And familiar fraud is when someone you know, such...

Read More
June 1, 2016
Comments [0]

By Brooke Niemeyer

Skimming is a fairly common scam, which involves thieves placing a device over an ATM or other payment terminal that steals debit or credit card information from any cards used at that machine. But criminals are taking this one step further thanks to Russian-speaking Skimer group.

...

Read More
May 25, 2016
Comments [0]

Your identifying information is valuable to identity thieves who aim to use it for profit.

Find out which personal information is the most valuable, learn the telltale signs of fraud, and discover how to protect yourself in our latest infographic.

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started