Items Tagged with "fraud"
October 20, 2011 Added by:Headlines
“My first question is always to ask executives ‘do you really know how safe your own organization is?’ Some do reply confidently. Most do not. Fraud can happen anywhere, anytime, but it is relatively straightforward to deter or discover at an early stage with the right systems..."
October 10, 2011 Added by:Headlines
"This is by far the largest... identity theft/credit card fraud cases that law enforcement has come across. Credit card fraud and identity theft are two of the fastest growing crimes in the United States, afflicting millions of victims and costing billions..."
October 07, 2011 Added by:Robert Siciliano
The FS-ISAC consists of a group of banks that shares threat information and interacts with the federal government on critical infrastructure issues. Its members include Citi, Prudential, Bank of America, JPMorgan Chase, Goldman Sachs and Wells Fargo, among others...
September 30, 2011 Added by:Robert Siciliano
Here we are in 2011 and well over half a billion records have been breached. While not all of the compromised records were held by financial institutions or were accounts considered “high-risk”, many of those breached accounts have resulted in financial fraud or account takeover...
September 30, 2011 Added by:Headlines
"These man-in-the-middle attacks are potentially possible on a wide variety of electronic voting machines. We think we can do similar things on pretty much every electronic voting machine. This is a national security issue. It should really be handled by the Department of Homeland Security..."
September 21, 2011 Added by:Infosec Island Admin
Imitation is a form of flattery, but what is outright copying and pasting of original content and pretending its your own? That’s called PLAGIARISM and its WRONG Mr. Steven Lentz, CISSP. You SCRAPED the content, REMOVED MY NAME and all ATTRIBUTION and posted it as your own...
September 08, 2011 Added by:Brian McGinley
Make sure your company has a policy and operational execution against that policy that looks at data protection, remote access and computer account privileges during terminations that provide for securing company property, password changeovers within the company and outside vendors...
September 07, 2011 Added by:Headlines
“Foster exploited his position as a trusted insider to embezzle tens of millions of dollars and to conceal the theft for as long as possible. The FBI is determined to uncover bank larceny in any form,” said FBI Assistant Director in Charge Fedarcyk...
August 29, 2011 Added by:Thomas Fox
Encouraging internal reporting helps you detect misconduct in its earlier stages. The sooner you investigate, the sooner you put an end to the misconduct reported. For fraud cases, this is particularly important, as stopping fraud sooner results in less money lost...
August 26, 2011 Added by:Robert Siciliano
Even today, the HRdirector may have a new boyfriend who happens to have a drug problem, and who needs her to steal your identity so that he can get a fix. The fundamental issue of identity theft hasn’t changed, and the people doing it are the same. Frequently, they are those on the inside...
August 25, 2011 Added by:PCI Guru
EMV and contactless technologies do not entirely solve the fraud problem. While they minimize fraud in the case of card present transactions, they do not even address fraud in card not present transactions. And it is in card not present transactions where fraud is most prevalent...
August 24, 2011 Added by:Robert Siciliano
A true identity theft protection service monitors your identity by checking credit reports and scanning the Internet for your personal information. It looks out for your Social Security number, and if something goes wrong, has people who’ll work with you to resolve the problem...
August 23, 2011 Added by:Robert Siciliano
Over the past decade criminals have learned the ins and outs of exploiting online banking using PC’s. In the past 15 years or so, the desktop computer has been hacked in every possible way, making the computer and the data it contains and transmits extremely vulnerable to fraud...
August 22, 2011 Added by:Brian McGinley
Whatever your business, Security Risk Management should be in that pie chart—as an integrated slice of your business. Integration is tenet number one, and as a security professional in your company, your main job is to be a business enabler and evangelist to make this so...
August 19, 2011 Added by:Kelly Colgan
A Florida waitress used a skimmer to steal their credit card information, make new cards and rack up thousands of dollars in charges at Radio Shack and Walmart—all on their dime. The 25-year-old told authorities she targeted customers who she thought treated her poorly by running her around...
August 19, 2011 Added by:Robert Siciliano
The lack of specifics makes it difficult for victims to attain any closure and move forward. “No matter how well they monitor their financial records for the rest of their lives, they may still feel vulnerable,” Van Vliet says...