Learn more about Online Bank Fraud

In the beginning, the term hacker had a positive connotation in the computing sector and among programming experts. “Hackers” were considered to be especially skillful and creative in developing programs and highly effective algorithms. Over the years, this positive image gradually changed.
READ MORE
A group of golfers were asked whether they would feel capable of moving the ball with their hand to place it in a more favorable position. A high percentage of these players said that they would not.
READ MORE
Today’s teens form part of Gen Z, young people who were born and raised in the new technology era, who cannot envisage an offline world with no access to the Internet or social media. From an early age, they have juggled with computers, tablets and smartphones, accessories they use in their daily lives. In tandem, data also evidence that cybercrime is increasingly attracting and engaging with the ...
READ MORE
Paul Graham, one of the foremost experts and educators on the hacker phenomenon, talks about how two of top hackers’ main traits are their curiosity and their capacity for concentration. Hackers are tremendously curious about how things work; this is linked to their ability to program, which basically amounts to making something do what you want it to.
READ MORE
There’s no question that phishing can be considered the star of the cybercrime world. The term comes from “fishing”, because the point of this scam is to “fish” for internet user information. In other words, scammers try to get victims to take the “bait” and provide private data, such as banking information, passwords, personal information, etc. Once they have this data, phishers gain access to ...
READ MORE
Identity theft or misappropriation is one of the cybercrimes that has most risen in recent years, causing not only considerable economic losses but also undermining one of the benefits that most major companies have been reaping from the Internet, to be a space for the commercial transactions of the future.
READ MORE
When we’re on the subject of malware and cyber attacks, we usually focus our attention on cybercrime as a totally unknown, uniform entity. Nevertheless, cybersecurity specialists, such as buguroo’s team, are always mindful not only of the codes used to develop computer viruses, but also of the processes adopted to implement campaigns and the targets they were aimed at. It is these three elements ...
READ MORE
The digital threat environment has intensified considerably over the last five years. Hackers orchestrated approximately 1,056 data breaches worldwide in 2013, making off with more than 575 million sensitive files, according to research from the information security company SafeNet. 
READ MORE
One of the reports monitoring the cybersecurity industry conducted by the Ponemon Institute was published recently. The report includes interviews with several client companies that use Threat Intelligence to discover which components they believe are most important and whether they find them useful or not. The report compares the years 2015, 2016 and 2017.
READ MORE
Fraud is inherent in all kinds of companies, whatever industry they operate in. Whenever there are gains to be made, there is a likelihood of some type of fraud being committed. Unfortunately, organizations do not deal with fraud as they should; either because it does not occur very frequently or because the organizations themselves do not succeed in managing it properly.
READ MORE

Did you like it? Share in your social communities

 

What did you think about this topic?

Leave your comments

 

Need to reduce fraud in your online banking?

Discover our holistic vision applied to online detection

Request demo