One minute and thirty-six seconds. That’s all it took for seven thieves, both men and women, dressed in hoodies and jackets that adequately concealed their identity, to enter an Apple store in Natick, Massachusetts, in a carefully coordinated heist. They were able to disable security tethers and make off with 19 iPhones, worth about $13,000.
Global retailers can expect a 12 percent growth in online fraudulent activity in the upcoming holiday season, compared with the same period last year—and lower ticket prices on fraudster-targeted gifts and products.
One cyber company is predicting a significant increase in card-not-present fraud—fraudulent transactions where a credit card is not physically presented to a merchant—from Black Friday to Cyber Monday when compared to past years.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!