Items Tagged with "fraud"


03b2ceb73723f8b53cd533e4fba898ee

On the Growth of Identity Theft

May 01, 2012 Added by:Pierluigi Paganini

It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Five Steps to a Successful Social Attack

April 29, 2012 Added by:Neira Jones

You might not fall for these attacks, but how many members of your family would? How many employees in your organization would, from field staff to C-level execs? Different people will have different thresholds to these attacks. Security education and awareness is key...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Duty to Authenticate Identity: Online Banking Breach Lawsuits

April 26, 2012 Added by:David Navetta

The attenuated nature of online relationships creates an opportunity for criminals to steal or spoof online identities and use them for monetary gain. The ability of one party to authenticate the identity of the other party in an online transaction is of key importance...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

From Fraud to Infosec and Vice Versa... Part 2

April 23, 2012 Added by:Neira Jones

In my previous post I summarized fraud and how it relates to infosec. Key enablers used to defraud victims of all types cut across the landscape and often overlap, posing further challenges for quantifying their impact, but the classifications are nonetheless helpful...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

From Fraud to Infosec and Vice Versa... Part 1

April 18, 2012 Added by:Neira Jones

To all of you infosec professionals out there: one way to show you add value is get closer to your fraud colleagues and try to understand what their big ticket items are. You can even ask them the right questions as the big ticket items are more than likely those detailed here...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Increasingly Concerned About Smart Meter Hacks

April 10, 2012 Added by:Headlines

"The FBI warns that insiders and individuals with only a moderate level of computer knowledge are likely able to compromise meters with low-cost tools and software readily available on the Internet..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

P2P File Sharing Security Concerns for Small Businesses

April 04, 2012 Added by:Robert Siciliano

In my own P2P security research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and Social Security numbers for entire family...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Protect Yourself from Vishing Scams

March 30, 2012 Added by:Robert Siciliano

Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Convicted for Roles in Massive Identity Theft Ring

March 23, 2012 Added by:Headlines

After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

FTC Says Tax Fraud is On the Rise and Here's Why

March 11, 2012 Added by:Kelly Colgan

Used to be crooks snagged a Social Security number to open a credit card and run up charges. Now they've found an easier way to make money, according to the FTC: Identity thieves prefer to commit tax and wage-related fraud...

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Why The Push For EMV Adoption In The United States?

February 20, 2012 Added by:PCI Guru

What is Visa USA trying to prove with this push of EMV? Apparently only Visa USA can tell us because, for the rest of us, there are no business cases we can construct to justify the switch to EMV. Obviously, Visa USA knows something that the rest of us do not. Or do they?

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Your Name and SSN - All a Thief Needs for Tax Fraud

February 14, 2012 Added by:Kelly Colgan

The IRS has seen a significant increase in the number of fraud cases involving identity theft, according to Steven Miller, IRS deputy commissioner for services and enforcement. Addresses don’t mean anything. All a thief needs is your name and Social Security number...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Intrusions Facilitate Wire Transfers Overseas

January 30, 2012 Added by:Headlines

The FBI has observed a trend in which cyber criminals are compromising the e-mail accounts of U.S. individuals and businesses and using variations of the legitimate e-mail addresses associated with the victim accounts to request and authorize overseas transactions...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »