Items Tagged with "fraud"
The Evolution of Online Fraud Prevention
October 27, 2011 Added by:Robert Siciliano
When merchants moved from catalogs to websites, IP addresses were used to track transactions. But bad guys figured out how to spoof them. Now we have a number of new technologies designed to fight credit card fraud. The most effective and widely implemented is device reputation...
Comments (0)
Ten Early Warning Signs of Fraud in the Enterprise
October 20, 2011 Added by:Headlines
“My first question is always to ask executives ‘do you really know how safe your own organization is?’ Some do reply confidently. Most do not. Fraud can happen anywhere, anytime, but it is relatively straightforward to deter or discover at an early stage with the right systems..."
Comments (0)
Over 100 Arrested in Credit Card Fraud Operation
October 10, 2011 Added by:Headlines
"This is by far the largest... identity theft/credit card fraud cases that law enforcement has come across. Credit card fraud and identity theft are two of the fastest growing crimes in the United States, afflicting millions of victims and costing billions..."
Comments (0)
Study Shows Banks Blocking More Fraud
October 07, 2011 Added by:Robert Siciliano
The FS-ISAC consists of a group of banks that shares threat information and interacts with the federal government on critical infrastructure issues. Its members include Citi, Prudential, Bank of America, JPMorgan Chase, Goldman Sachs and Wells Fargo, among others...
Comments (0)
Usernames and Passwords Are Facilitating Fraud
September 30, 2011 Added by:Robert Siciliano
Here we are in 2011 and well over half a billion records have been breached. While not all of the compromised records were held by financial institutions or were accounts considered “high-risk”, many of those breached accounts have resulted in financial fraud or account takeover...
Comments (0)
Researchers Demonstrate Diebold Voting Machine Hack
September 30, 2011 Added by:Headlines
"These man-in-the-middle attacks are potentially possible on a wide variety of electronic voting machines. We think we can do similar things on pretty much every electronic voting machine. This is a national security issue. It should really be handled by the Department of Homeland Security..."
Comments (0)
CISSP Ethics and Outright Plagiarism
September 21, 2011 Added by:Infosec Island Admin
Imitation is a form of flattery, but what is outright copying and pasting of original content and pretending its your own? That’s called PLAGIARISM and its WRONG Mr. Steven Lentz, CISSP. You SCRAPED the content, REMOVED MY NAME and all ATTRIBUTION and posted it as your own...
Comments (32)
Smarter Security Steps Part 2: Information Management
September 08, 2011 Added by:Brian McGinley
Make sure your company has a policy and operational execution against that policy that looks at data protection, remote access and computer account privileges during terminations that provide for securing company property, password changeovers within the company and outside vendors...
Comments (0)
Citigroup Executive Pleads Guilty to Insider Theft of Millions
September 07, 2011 Added by:Headlines
“Foster exploited his position as a trusted insider to embezzle tens of millions of dollars and to conceal the theft for as long as possible. The FBI is determined to uncover bank larceny in any form,” said FBI Assistant Director in Charge Fedarcyk...
Comments (0)
The Benefits of Investigating Employee Complaints
August 29, 2011 Added by:Thomas Fox
Encouraging internal reporting helps you detect misconduct in its earlier stages. The sooner you investigate, the sooner you put an end to the misconduct reported. For fraud cases, this is particularly important, as stopping fraud sooner results in less money lost...
Comments (1)
Insider Identity Theft is Still a Problem
August 26, 2011 Added by:Robert Siciliano
Even today, the HRdirector may have a new boyfriend who happens to have a drug problem, and who needs her to steal your identity so that he can get a fix. The fundamental issue of identity theft hasn’t changed, and the people doing it are the same. Frequently, they are those on the inside...
Comments (0)
A Carrot for Chip and PIN
August 25, 2011 Added by:PCI Guru
EMV and contactless technologies do not entirely solve the fraud problem. While they minimize fraud in the case of card present transactions, they do not even address fraud in card not present transactions. And it is in card not present transactions where fraud is most prevalent...
Comments (0)
What Identity Theft Protection Is and Is Not
August 24, 2011 Added by:Robert Siciliano
A true identity theft protection service monitors your identity by checking credit reports and scanning the Internet for your personal information. It looks out for your Social Security number, and if something goes wrong, has people who’ll work with you to resolve the problem...
Comments (2)
Mobile Banking More Secure than PC E-Commerce?
August 23, 2011 Added by:Robert Siciliano
Over the past decade criminals have learned the ins and outs of exploiting online banking using PC’s. In the past 15 years or so, the desktop computer has been hacked in every possible way, making the computer and the data it contains and transmits extremely vulnerable to fraud...
Comments (0)
Twenty-One Steps to Smarter Security
August 22, 2011 Added by:Brian McGinley
Whatever your business, Security Risk Management should be in that pie chart—as an integrated slice of your business. Integration is tenet number one, and as a security professional in your company, your main job is to be a business enabler and evangelist to make this so...
Comments (0)
Here's a Tip for Your Waitress: Don't Rip Me Off
August 19, 2011 Added by:Kelly Colgan
A Florida waitress used a skimmer to steal their credit card information, make new cards and rack up thousands of dollars in charges at Radio Shack and Walmart—all on their dime. The 25-year-old told authorities she targeted customers who she thought treated her poorly by running her around...