Cybersecurity

Computer security, cybersecurity or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Source: en.wikipedia.org

Business’s Data May Be Vulnerable Under Proposed China Cybersecurity Rules
Business’s Data May Be Vulnerable Under Proposed China Cybersecurity Rules
June 02, 2022  |  Cybersecurity

Proposed cybersecurity rules from China could make it hard for Western financial companies to operate as their data would be vulnerable to hacking and other...

READ MORE >
Incognia Grabs $15.5M to Increase Its ID Fraud-Fighting Efforts
Incognia Grabs $15.5M to Increase Its ID Fraud-Fighting Efforts
June 02, 2022  |  Investments

Mobile identity platform Incognia on Thursday (June 2) finalized a $15.5 million Series A fundraising round that it plans to use for continued growth of...

READ MORE >
Today in TechREG: EU Supervisors Seek Powers to Revoke Licenses for AML Breaches; California Wants Input on Crypto Regulation
Today in TechREG: EU Supervisors Seek Powers to Revoke Licenses for AML Breaches; California Wants...
June 02, 2022  |  Regulation

Today in TechREG, three European Union supervisory authorities, including the banking and financial markets authorities, advocated for amending sectoral laws to include more powers to...

READ MORE >
Apple’s App Store Rejected $1.5B in Fake Transactions in ’21
Apple’s App Store Rejected $1.5B in Fake Transactions in ’21
June 01, 2022  |  Apple

Apple has stopped over $1.5 billion in possibly fraudulent transactions, a company blog said Wednesday (June 1). The company said it’s stopped more than 1.6...

READ MORE >
Cortex Management on Utilizing Behavioral Analytics to Reduce Customer Frictions and Limit Identity Fraud
Cortex Management on Utilizing Behavioral Analytics to Reduce Customer Frictions and Limit Identity Fraud
June 01, 2022  |  Authentication

In this month’s "Monetizing Digital Intent Tracker," Nitesh Harsh, director of risk portfolios for Cortex Management, tells PYMNTS about the urgent fraud prevention upgrade needed...

READ MORE >
Legacy Fraud Techniques No Match For Cybercriminals Using ‘Weaponized’ Identity Credentials
Legacy Fraud Techniques No Match For Cybercriminals Using ‘Weaponized’ Identity Credentials
May 31, 2022  |  Authentication

Identity fraud is one of the most pressing cybersecurity threats today, with 2.5 million identities stolen each year and affecting more than 15 million people...

READ MORE >
Fixing Retail’s $600 Billion False Declines Problem When Fighting Fraud
Fixing Retail’s $600 Billion False Declines Problem When Fighting Fraud
May 27, 2022  |  Security & Fraud

Fighting fraud and pushing back cybercriminals has become the central focus of cybersecurity – and for very good reason. Cybercriminals have proven themselves to be...

READ MORE >
Scammers Used Twitter’s Crypto Community to Steal Information
Scammers Used Twitter’s Crypto Community to Steal Information
May 26, 2022  |  Security & Fraud

Scammers are hijacking Twitter accounts to promote questionable cryptocurrency platforms that let them compromise their victim’s information. That’s according to Bloomberg News, which reported Thursday...

READ MORE >
Mastercard Touts Value of ‘War Games,’ Simulations in Prepping for Cyberattacks
Mastercard Touts Value of ‘War Games,’ Simulations in Prepping for Cyberattacks
May 24, 2022  |  Security & Fraud

The best way for enterprises to battle frauds, bot attacks, synthetic ID attacks … … is to treat it all like a game. A war...

READ MORE >