![District Attorney NYC](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111630/district_attorney_nyc-400x200.jpg)
StubHub fraud ringleader sentenced to state prison
Vadim Polyakov was sentenced to 4-to-12 years in state prison for coordinating an international cybercrime and money laundering scheme that involved the theft of personal …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112424/atm-400x200.jpg)
Criminals stole $12.7 million from ATMs in Japan
In the early morning hours of May 15, 2016, a group of over 100 people executed coordinated, fraudulent ATM withdrawals that netted them about 1.44 billion yen. In a period of …
![tax](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113939/tax-400x200.jpg)
Fraudsters steal tax data from ADP customer portal
ADP has confirmed identity thieves managed to access W-2 data of a number of its customers’ employees through the company’s customer portal, but says that the …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Online transaction fraud to reach $25 billion by 2020
Online transaction fraud is expected to reach $25.6 billion by 2020, up from $10.7 billion last year, according to Juniper Research. This means that by the end of the decade, …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113426/money-400x200.jpg)
How tax fraud occurs and how to stay safe
The IRS is now taking up to 21 days to review a tax return. Last year, a similar tax return took seven days to review, according to iovation. This increase of taking up to …
![digital identity graph](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113813/digitalgraph.jpg)
Digital Identity Graph helps detect fraud, cyberattacks
ThreatMetrix announced at RSA Conference the newest innovation in the fight against global cybercrime – the Digital Identity Graph, a framework for anonymized global digital …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113832/money-bags-400x200.jpg)
Leader of group that stole $55M by hacking payment processors pleads guilty
Ercan Findikoglu, a Turkish citizen also known by the online nicknames “Segate,” “Predator,” and “Oreon,” pleaded guilty to computer intrusion conspiracy, access device fraud …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194246/e-commerce-400x200.jpg)
Ecommerce fraud surges 163%
The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half …
![phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194408/phone-400x200.jpg)
VoIP phones can be turned into spying or money-making tools
A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …
![Airbnb](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194427/airbnb-400x200.png)
Beware of Airbnb-themed phishing schemes
Airbnb-themed phishing scams do not crop up often, but customers of the service should be aware of the possibility of getting their login credentials stolen and misused. …
![Android Marshmallow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194956/android-marshmallow-400x200.jpg)
Asacub Android Trojan: Financial fraud and information stealing
Asacub is a new malware that targets Android users for financial gain. When first identified, Asacub displayed all the signs of an information stealing malware; however, some …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/10/09195836/sift-102015-1.png)
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD