Thursday, October 27, 2016

Fighting Online Fraud Through eDNA by Online Security



Long ago, a cartoon ran in The New Yorker, showing a canine seated at a desktop computer. “On the internet,” ran the caption, “nobody knows you’re a dog.”

The same premise holds true today and poses a knotty question in online commerce and FinTech: How do you know the person on the other end of a transaction is really who they say they are? And even if you do confirm their identity, how do you know that person can be trusted?

One firm, IdentityMind Global, provides real-time risk management and fraud prevention through “digital identities,” collecting data across dozens of parameters, separating the financial ecosystem into good actors — those deserving of trust (and completed transactions) — and, well, bad actors.

In an interview with PYMNTS’ Karen Webster, Garrett Gafke, president, CEO and founder of IdentityMind Global, said that the construction of digital identities, by necessity, goes well beyond data that might be thought of as standard, such as a street address, a credit card number or a two-factor security question test.

True merchant risk goes hand-in-hand with global digital commerce and, as Gafke described it, comes in the form of people with little or no history — no history of driver’s licenses, credit cards issued, traditional bank accounts or other standard bits of information. They may not even be scored by the traditional credit bureaus. Yet, these individuals are looking to do business and conduct transactions. Their would-be partners on the other end of the transaction must decide whether to enter into a relationship (however fleeting) with that consumer … or not.

Gafke noted that “transactions of any kind leave a kind of financial, online exhaust” and that each transaction has attributes that, taken together over time, ultimately, can be assembled into a digital identity. “This is real, current information,” said Gafke, “rather than just public, physical information. Good reputations are built slowly, while bad reputations come very quickly.”

That digital identity is established, as Gafke said, in IdentityMind Global’s platform, which links and finds correlations between disparate bits of information and transaction trails that “process, capture, rate and build overall profiles on online identities.” Emails, digital wallets and payments are all linked together, said the executive, to build a “trusted” digital identity.

“Trust” would be the operative word in the relationship between individuals and the firms with which they seek to do business. Trust would also extend to, and be colored by, the people associated with that individual or business. Consider how, in the age of social media, amidst concerns about money laundering, an individual might be viewed with demonstrable trails of following, say, terrorist-linked groups on Twitter.

In a recent whitepaper by the firm, IdentityMind Global also noted that additional data points may come from internet-enabled devices, which can, for instance, help bring location into consideration when determining good actors from bad and in screening across sanctioned individuals or nations.


Using these techniques, said IdentityMind Global in its whitepaper, can help reduce manual review time. There is also a financially positive impact, via a 60 percent reduction in transactional fraud from chargebacks and a 90 percent reduction in fraud that comes at the point of account origination.

Monday, October 17, 2016

Online Security: These Are Today's Top 8 Cyber-Crime Trends According to Europol

In its Internet Organized Crime Threat Assessment (IOCTA) report released today, Europol has detailed today's top 8 most prevalent cybercrime trends, for which investigators have seen a rise in detected incidents since the start of the year.

The report, which highlights an upward trend for volume, scope and material cost of cybercrime, comes on the heels of UK authorities announcing earlier in the year that cybercrime has surpassed traditional crime for the first time in their country's history.

Europol says that the digital underground is shifting towards a Crime-as-a-Service business model, with various individuals and groups specializing in a niche crime and providing technical support and service for that crime alone using online services.

From illegal weapons sales to on-demand hacks, and from DDoS-for-Hire services to exploit kit packages, you can buy online almost any type of cybercrime service these days.

If you read Softpedia's Security News section, you can hardly go one day without reading a report on ransomware-related topics. Besides ransomware, Europol also says that banking trojans have been a popular form of malware this year as well.

Recent hacks and data breaches have thrust troves of data in the public eye, which crooks are leveraging for other hacks, fraud, and even extortion.

Europol says it received a large number of fraud complaints, which were traced back to organized crime groups hacking ATMs, EMV, and contactless (NFC) cards.

#5: Online child sexual abuse
The large number of online tools and services providing complex and unbreakable end-to-end encryption, along with anonymous payments supported via crypto-currencies has resulted in "an escalation in the live streaming of child abuse."

More and more crime-related activities have now moved to the Darknet (or Dark Web), a portion of the Internet for which you need special software like Tor and I2P to access. Criminals are taking advantage of the anonymity these networks provide to go about their business unabated.

#7: Social engineering
Europol says that spear-phishing incidents aimed at high-value targets have gone up in 2016, and it highlights the increase in CEO fraud (BEC scams) attacks.

#8: Virtual currencies
Europol says Bitcoin has become the de-facto standard currency for extortion payments. This is also the reason why Europol established a Bitcoin Money Laundering Division earlier this month.


Thursday, October 6, 2016

Phishing and Other Suspicious Emails by Oakmere Road

Phishing refers to an email that attempts to fraudulently acquire personal information from you, such as your Apple ID, password and/or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it's not.

As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email.

If you are concerned that your Apple ID or other Apple accounts may have been compromised, please refer to Apple ID Security below.

If you receive what you believe to be a phishing email purporting to be from Apple, please send it to reportphishing@apple.com, a monitored email inbox, which does not generate individual email replies.

Forwarding the message with complete header information provides Apple with important information. To do this in OS X Mail, select the message and choose Forward As Attachment from the Message menu. For other email applications or webmail based services, consult your provider’s support information to determine how to forward messages with complete headers.

For more information about identifying legitimate emails from the iTunes Store, see Identifying legitimate emails from the iTunes Store.

For more information about identifying “phishing” emails, see Identifying fraudulent ‘phishing’ emails.

To report spam or other suspicious emails that you have received in your iCloud.com, me.com or mac.com inbox, please send them to abuse@icloud.com.

To report spam or other suspicious messages that you have received through iMessage, please send them to imessage.spam@apple.com with the requested information.

For information about best practices in Apple ID security, see Apple ID: Security and your Apple ID.

For information about two-step verification for Apple ID, see Apple ID: Frequently asked questions about two-step verification for Apple ID.

If you believe that your Apple ID has been compromised, please visit Apple ID to change your password immediately.


- Apple ID Support
- iCloud Support
- iTunes Store Support
- iPhoto Support

- Apple Store Support