article thumbnail

Email’s Role In Combatting Business Email Compromise

PYMNTS

With the business email compromise (BEC) phishing attack a continuously growing threat for businesses large and small, organizations are exploring how strategic cybersecurity investments can protect them when bad actors attempt to steal company cash or redirect business payments.

article thumbnail

Business Email Compromise Fraud: Should the Party Best Positioned to Avoid the Fraud Bear the Loss? 

Fintech Weekly

As business email compromise (BEC) cases rise, courts are split on who bears the loss. Learn how the imposter rule and alternative legal frameworks shape liability in BEC disputes.

article thumbnail

FBI, BBB Sound Another Business Email Compromise Alarm

PYMNTS

companies via the Business Email Compromise scam, reports in The East African said last week. Through Operation reWired, we are sending a clear message to the criminals who orchestrate these Business Email Compromise schemes that ‘I will keep coming after you, no matter where you are.’”.

article thumbnail

Businesses grapple with payments fraud

Payments Dive

Companies are struggling to keep up with fraudsters’ growing technological prowess, particularly in business email compromises.

article thumbnail

Payments Innovation Alliance Releases Business Email Compromise Response Action Plan

NACHA

Payments Innovation Alliance Releases Business Email Compromise Response Action Plan bjaffe@nacha.org Tue, 07/30/2024 - 16:17 Image Media Business Email Compromise

article thumbnail

FBI Arrests 74 People For Business Email Compromise Scams

PYMNTS

and overseas for engaging in international business email compromise schemes aimed at intercepting and stealing wire transfers from individuals and businesses. Since the Internet Crime Complaint Center (IC3) began tracking BEC and its variant, e-mail account compromise (EAC), there has been more than $3.7

article thumbnail

What is Business Email Compromise (BEC)?

Nanonets

Business Email Compromise (BEC) is a cyber threat that exploits the vulnerabilities of email communication. Perpetrators impersonate trusted entities, such as executives or vendors, employing social engineering techniques to coerce employees into compromising actions. What is Business Email Compromise (BEC)?