Security News

Mitek introduced Check Fraud Defender, an artificial intelligence-powered, cloud-hosted consortium for financial institutions to counteract check fraud. An important addition to a financial institution's fraud-fighting protocols, Check Fraud Defender helps protect against the growing sophistication of check fraud attacks.

"No single organization can stop synthetic identity fraud on its own," reports The Federal Reserve. As within each of these examples, the same concept applies in fighting identity fraud, which we cannot defeat entity by entity, individual by individual-but as a unified, global consortium working to detect fraud.

Ping Identity has acquired SecuredTouch, a provider of fraud and bot detection and mitigation. As SecuredTouch is integrated with the broader PingOne Cloud Platform, enterprise customers will have access to advanced signals, data, and intelligence to gain a greater understanding of fraudster behavior, and step up authentication when needed to stop malicious activity and reduce fraud loss.

RSA Security this week announced that its fraud and risk intelligence unit has become a new standalone company named Outseer. The spinout company will be led by CEO Reed Taussig, who previously served as CEO of Apptimize and ThreatMetrix.

RSA Security announced the transition of its Fraud & Risk Intelligence business into a new standalone company serving a worldwide customer and partner community. The new organization, Outseer, is led by CEO Reed Taussig who joined the RSA Fraud & Risk Intelligence business in late 2020 and is a veteran of the fraud prevention and digital identity industry.

A new analysis from the Washington Post reveals just how widespread fraud is across the Apple App Store, while also offering glimpse into the revenue flowing into Cupertino generated by those malicious activities. The Apple App Store has been under heightened scrutiny for maintaining its iron grip on the apps available to iOS users.

The US Supreme Court on Thursday limited the scope of the 1986 Computer Fraud and Abuse Act in a ruling that found a former sergeant did not violate the law by misusing his access to a police database. The CFAA prohibits accessing a protected computer "Without authorization" and accessing a protected computer in a way that "Exceeds authorized access." The problem with these ill-defined terms is that there's been disagreement in different courts over whether the law imposes criminal liability for violating Terms of Service agreements.

ID R&D's pioneering facial and voice biometric capabilities provide increased protection against today's most sophisticated identity theft and increasingly dangerous fraud techniques, such as deepfakes and synthetic voice augmentation. To defend against the rise and growing sophistication of these fraud attacks, the identity verification market is expected to reach $15.8 billion in the US by 2025, according to a report by Markets and Markets.

Mobile ad fraud has always been a challenge for network operators in all parts of the globe, but the pandemic has made users more vulnerable than ever before due to the sheer amount of time they now spend with their devices. Perhaps that's why, according to a new report published by Upstream, they seem to be the epicenter of a new mobile malware pandemic.

A data poisoning attack aims to modify a model's training set by inserting incorrectly labelled data with the goal of tricking it into making incorrect predictions. We decided to study data poisoning attacks against example scenarios similar to those that might be used in a fraud detection system on an e-commerce website.