Items Tagged with "fraud"


D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Prey on Worried Parents

August 02, 2012 Added by:Theresa Payton

Cyberthieves are trolling the internet for information and with a convincing phone call trying to trick parents out of thousands of dollars. It sounds like this scam would be easy to spot but it’s so scary, so emotional, and happens so often even Western Union employees are trained to ask questions...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS: Cybersecurity Awareness and the Summer Olympics

July 19, 2012 Added by:Infosec Island Admin

Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI: More Arrests in International Cyber Crime Takedown

July 13, 2012 Added by:Headlines

"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Georgia Man Convicted for Role in Phishing Operation

July 03, 2012 Added by:Headlines

Osarhieme Uyi Obaygbona, 32, of Atlanta, Georgia, was convicted last week of conspiracy to commit wire fraud, conspiracy to commit identity theft, and conspiracy to gain unauthorized access to protected computers. Phishing attacks use fraudulent web pages that mimic the legitimate web pages...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats Confound Enterprise Security Efforts

June 20, 2012 Added by:Headlines

"The majority of staff within any organization are trustworthy and honest. But businesses must understand the scale of the threat posed by the small proportion of staff who act dishonestly and defraud their employer and the numerous ways in which an organization can be targeted"...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobiles and Phishing – Why They're More Dangerous

June 14, 2012 Added by:Robert Siciliano

SMiShing is a version of phishing in which scammers send text messages. The best protection from this scam is awareness. Once you understand how it works, you are better positioned to recognize mobile phishing, and how to avoid clicking links within emails or text messages and otherwise responding to such ruses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The FBI's Most Wanted Cyber Criminals

June 13, 2012 Added by:Headlines

While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...

Comments  (0)

37d5f81e2277051bc17116221040d51c

POS Skimming: Bad News for Banks and Merchants

June 12, 2012 Added by:Robert Siciliano

EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Man Sentenced to Almost Five Years in Prison for Identity Theft

June 04, 2012 Added by:Headlines

Michael Garcia was sentenced by U.S. District Judge Morrison C. England Jr. to 57 months in prison for fraud. Garcia accessed the computer servers of a law firm and an accountant firm without their knowledge or authorization and downloaded the personal information of more than 1,450 clients and employees...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Social Engineering: A True Story of Incredible Deception

May 31, 2012 Added by:Ben Rothke

In the vernacular of infosec, Tania Head was a type of social engineer. In the book Social Engineering: The Art of Human Hacking, Christopher Hadnagy details how attackers use social engineering to manipulate people into performing actions or divulging information...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Is Business or Corporate Identity Theft?

May 30, 2012 Added by:Robert Siciliano

Victims of business identity theft often do not find out about the crime until significant losses accumulate, or someone discovers discrepancies on the books. Because of the hidden nature of the transactions, businesses can lose vast amounts of money. Business identity theft can remain unde­tected for years...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance on Avoiding Internet-Based Fraud

May 21, 2012 Added by:Infosec Island Admin

Listed below are tips to protect your business, yourself and your family from various forms of Internet fraud. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center a partnership of the FBI and the NWCCC...

Comments  (2)

9f19bdb2d175ba86949c352b0cb85572

Who Are You Preaching to Anyway?

May 15, 2012 Added by:Neira Jones

Hard core security conferences continue to happen and continue to be successful, and long may it continue. We still need the techies to make sure we have the right tech to support the people and processes in our businesses. We also need the techies to try and keep ahead of the bad guys...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

IC3: 2011 Internet Crime Report

May 15, 2012 Added by:Pierluigi Paganini

IC3 represents a perfect example of how technological services could help in the prevention and analysis of criminal activities, and highlights that the real weapon against Internet crime is awareness and information sharing...

Comments  (0)

4c22630536d3dc5e345fe1ec0ddc062b

Password Policy: Sharing Passwords

May 02, 2012 Added by:benson dana

I once worked at a place where a senior manager collected the passwords of employees. There had been resistance to giving up this policy, and the excuse was that this unit's mission was unique and that this was necessary. How often does the internal auditor hear this excuse?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »