Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Identifying fraudsters on the internet
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Identifying fraudsters on the internet
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
deepfakeCybersecurity ExecutivesExpert Opinions

Identifying fraudsters on the internet

Tony Glover
February 7, 2025 at 12:48 PM
By Tony Glover Tony Glover
Share
Patrick Harding, Chief Product Architect at Ping Identity
SHARE
Patrick Harding, Chief Product Architect at Ping Identity
Patrick Harding, Chief Product Architect at Ping Identity

In an exclusive interview with Cyber Intelligence, Patrick Harding, chief product architect at digital identity security company, Ping Identity, outlines the growing threat of identity theft and fraud, explaining how it evolved and what can be done to counter it.

Cyber Intelligence: How widespread is the threat of identity fraud?

Patrick Harding: Everybody is forced into digital transactions and relationships and identity management is fundamental to knowing who you are interacting with. The problem goes back to the beginning of the internet in the 1990s and a cartoon of a dog in front of a computer with the caption, “On the internet no-one knows you’re a dog!” That really illustrates the core problem of identifying online users and customers. The extent to which this is carried out largely depends on the sensitivity of the activity concerned. There is a big difference between buying a pair of jeans online and opening a bank account. In both cases, there is a significant series of steps which could include requesting passport ID for financial services.

Cyber Intelligence: Is the problem of identity fraud worsening?

Patrick Harding: Ever since the start of the internet, people preferred to remain largely anonymous when making online transactions, just as you could go into a

shop and buy something for cash and walk out without anyone knowing who you are. When people started using credit cards in the late 1960s and early 1970s, they followed the same principle and shoppers were only required to proffer a plastic credit card and give a simple written signature. We have been trying to force that process onto the digital world and it is a very poor fit. But this approach is already showing cracks. Current methods of identity verifications typically include sending a verification code to the user’s cell phone or email. Banks may also require a potential customer’s social security number. But there is a constant balance that needs to be struck between ID security and ease of customer interaction so as not to deter potential purchasers of goods or services.

Cyber Intelligence: How can retailers best strike the balance between not overburdening customers with security while protecting themselves from refund scams and other frauds?

Patrick Harding: Multi-factor authentication via phone or email is now being widely used as a solution. But what is really happening is that the relationship between retailers and their customers is now adapting to the internet. Retailers now realize that a better knowledge of their customers’ identities enables them to upsell them. For instance, a tennis racquet manufacturer used to sell directly to sporting goods stores and they had no real idea who their end customers were. Selling directly to online users enables the manufacturer to learn far more about its customer base and target it far more directly.

Cyber Intelligence: Organised international ransomware gangs are a threat across all sectors. What can organizations do to protect not only themselves but also their customers, whose data may be exposed?

Patrick Harding: That is tough to tackle. Many successful ransomware attacks are the result of social engineering. It is, therefore, vital to have processes in place that enable verification even of emails that may appear to be valid, particularly if they request something out of the ordinary, such as a chief financial officer asking a member of staff to transfer a large amount of money to an unfamiliar account or to change their password. Unfortunately, phone numbers and emails can be spoofed. Staff cybersecurity education is, therefore, vital in order for them not to trust everything they see. The classic example is a deepfake video conference that duped an employee in a finance department into sending $26 million to the fraudster’s bank account.

Cyber Intelligence: How can companies in the financial services sector ensure that their identity management practices comply with new regulations such as the new European Digital Operational Resilience Act (DORA), which also applies to U.S. companies with European customers?

Patrick Harding: There’s an increase in strict cybersecurity laws now being enacted on both sides of the Atlantic to protect customers’ personal and financial data. It is likely that the financial services sector, in particular, will increasingly leverage remote biometric identification of online customers.

Cyber Intelligence: Thank you.

TAGGED: cybersecurity company, Cybersecurity, multi-factor authentication, threat intelligence, vulnerability, fraud, cyber intelligence, brand impersonation, regulation, identity theft, executive interview, financial services, Patrick harding, data privacy, cybersecurity executives, deepfake, digital identity, europe, ping identity, data protection
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article macos users targeted by infostealer malware MacOS users targeted by ‘infostealer’ malware
Next Article cyberattacks during valentine's day in 2025 The coming St Valentine’s Day cyber-massacre
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageSurveillanceSpywareNewsChina

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025
AI powered ransomware
ransomwareNewsAI

AI-powered ransomware fuels cybercrime

Cybercriminals are now weaponizing artificial intelligence (AI) to create potentially devastating off-the-shelf ransomware. Researchers at cybersecurity company ESET have discovered what they called "the first known AI-powered ransomware". The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt, and possibly even destroy data, though this last functionality appears not to have been implemented in the malware as yet.

August 28, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?