Items Tagged with "fraud"


44fa7dab2a22dc03b6a1de4a35b7834a

Identity Fraud Cases and Costs Plummeted Last Year

February 17, 2011 Added by:Bill Gerneglia

A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Does Device Reputation Protect Me?

February 16, 2011 Added by:Robert Siciliano

Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

ATM Card Skimmers Found on Key Card Door Locks

January 31, 2011 Added by:Headlines

"The thieves remove the card swipe device attached to the outside door, add a skimmer, and then reattach the device to the door. The attackers then place a hidden camera just above or beside the ATM, so that the camera is angled to record unsuspecting customers entering their PINs..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Much Longer Does the Magstripe Have?

January 29, 2011 Added by:Robert Siciliano

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a burnable CD. The simplicity of the magstripe’s design, coupled with the availability of card reading and writing technology, results in billions of dollars in theft and fraud...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Monitoring Site Traffic for Fraud Prevention

January 25, 2011 Added by:Richard Stiennon

Although deploying web application firewalls from Imperva or AppSec Inc. is the best way to defend against these attacks, more sophisticated attacks may take advantage of yet undiscovered vulnerabilities or use the very structure of the site to engage in fraudulent practices, often as authenticated users...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Will IPv6 Cause Chaos for the Browsing Public?

January 19, 2011 Added by:Rafal Los

Whether you're installing a drive-by trojan malware via 0day, collecting revenue from pay-per-click schemes, or XSS'ing your way into their bank account - the goal of this game is to make money on that person. Let's face it, business is good...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Exploiting Software Defects for Profit is Still Illegal

January 15, 2011 Added by:Rafal Los

Apparently through a combination of social engineering of casino floor workers, and "a software glitch" (affectionately referred to as a bug) this group of people was able to steal some very real money. The short of is that they were caught because they got greedy, as they always do...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Flash Attacks: Big Money for Payment Card Scammers

January 15, 2011 Added by:Robert Siciliano

The latest ATM scam is so brilliantly simple, it’s hard to believe that it actually works. Apparently, banks’ fraud detection systems are unable to flag nearly simultaneous transactions from the same account. This leaves bank customers vulnerable to what’s been termed a flash attack...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

EMC Engineer Stole Nearly $1 Million in Hardware

January 10, 2011 Added by:Headlines

Kevin Kelly, a former test engineer with EMC, has plead guilty to making off with almost one million dollars worth of equipment. Kelly concealed the hardware in a duffel bag and then he sold it on the internet. Most of the stolen goods were sold to BL Trading, a Massachusetts-based reseller...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Inside The Nigerian 419 Scam

January 10, 2011 Added by:Robert Siciliano

This is a simple but vicious scam that can easily take you by surprise. This scam can have many different twists and varieties, and you must avoid being taken in by any of them. The simplest solution is to never send money, for any reason, to anyone, in response to a phone call or email...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

High-Frequency Stock Trading Networks Vulnerable

January 07, 2011 Added by:Headlines

A former IBM research fellow has identified vulnerabilities in high-frequency stock trading networks that could allow hackers to manipulate trades by inflecting minute latencies that could result in significant aberrations to real-time stock prices, netting millions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Fake ATM Keypads Extremely Difficult to Detect

January 06, 2011 Added by:Headlines

With the new fake ATM keypads, the time between skimming and cashing-in is reduced significantly. The mock keypads are nearly undetectable to the lay person, and transmit PIN data in real time, along with the skimmed card information. Criminals can then immediately begin stealing cash directly from accounts...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Hacked Apple iTunes Accounts Offered for Sale

January 06, 2011 Added by:Headlines

China's biggest online retail website is offering hacked Apple iTunes store accounts for sale. The accounts contain detailed information including credit card numbers of the registered account owners, enabling purchasers of the breached accounts to buy music, movies, games and other products...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Retailers’ Point of Sale Terminals Skimmed

January 03, 2011 Added by:Robert Siciliano

POS machines are particularly vulnerable because the magnetic stripe technology, which has been around for 40 years, is essentially defenseless against modern fraud techniques. Anyone can easily, and legally, purchase a skimming device for a couple hundred dollars...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Banks Lax on Authentication and Transaction Security

January 03, 2011 Added by:Headlines

Complicating matters for banking customers who find themselves victims of breached accounts is that banks are only required to maintain "sufficient" standards of security, a moving target based on the average level of security employed by the industry as a whole, as far as legal liability is concerned...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Target Home Equity Lines of Credit

January 02, 2011 Added by:Headlines

It is possible that courts could hold banking clients responsible for losses if they deem the bank's security measures were on par with the industry average, even if that average standard is woefully inadequate to secure funds...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »