Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

NuData Security Reveals Recent Online Fraud Trends in Wake of Significant Breaches

by The Gurus
August 27, 2015
in Editor's News
Share on FacebookShare on Twitter

NuData Security today announced new threat intelligence that provides insight into the latest trends in online fraud.
Trends NuData Security researchers have observed include:

  • Account takeover, in which fraudsters steal an established account with personally identifiable information (PII) attached to it, continues to beat credit card fraud. This continuing trend showcases fraudsters’ preference for account details beyond just credit cards.
  • NuData Security evaluated 5.1 billion behaviours in May through July. Of the over 500 million account creations analysed, more than 57 percent were flagged as high risk or fraudulent, compared to 28 percent in February through April.
    • Account creation fraud has increased by more than 100 percent since February 2015.
  • Nearly half of all account registration fraud attempted in May was tied to creating false accounts to deliver false product ratings.
  • NuData Security observed more than 270 million fraudulent or high-risk behaviour events in May through July. These events were assessed through the following behavioural biometrics and data points, including more than:
    • 32.8 billion keystrokes
    • 9.3 billion clicks
    • 388 million unique email addresses
    • 191 million unique IP addresses
  • A significant portion of attacks in the past three months originated from China and the United States, however, incidents were traced back to as many as 151 countries. The top six sources of malicious behaviour include:
    • China
    • United States
    • Saudi Arabia
    • United Kingdom
    • Malaysia
    • Brazil

Unlike previous ecommerce industry breaches, recent attacks are growing in size and targeting more valuable PII, which may include information such as social security numbers and bank account information, among other data. A data breach has a ripple effect that reaches far beyond the breached organisation. Businesses must protect themselves from fraudsters who know more about their customers than they do. They must not only verify a user’s identity through PII, but must also verify that the behaviour behind the transaction is that of a valid user. This is where user behaviour analytics (UBA) play a vital role. Becoming complacent in an age of massive data breaches is both a financial and reputational hazard.
Michel Giasson, CEO, NuData Security, said:
“NuData Security is in a unique position to monitor key trends based on real-time analysis of fraudulent attempts at account creation, login and transaction. For organisations to protect their brand and users, they must figure out how to detect fraudsters utilising the increasing amount of stolen identity data. The good news is that harnessing the power of behavioural attributes and biometrics helps authenticate the genuine user. Behavioural analysis serves as a means of understanding how legitimate users truly act reducing the impact to victims of the data breach.”
To learn more about UBA, please watch: https://www.youtube.com/watch?v=MsbpzHwUa38&feature=youtu.be
To learn more about account takeover, please watch:  https://www.youtube.com/watch?v=-PR0q8M9cUk&feature=youtu.be
NuData Security’s online fraud detection solution, NuDetect, combines data from an array of customers, which includes top 10 e-commerce companies globally. Additional information on NuDetect is available at: http://nudatasecurity.com/nudetect/

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Agora shutdown amid security fears

Next Post

Continuous monitoring vs Black Hat hackers – which will you rely on to identify web security issues?

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information