Blog Posts Tagged with "fraud"

9fd81843ad7f202f26c1a174c7357585

Recovering from a Phish

August 05, 2010 Added by:Guy Pace

If you respond to a phish, you usually give up your email account and password, your network login and password at work, bank account and PIN or credit/debit card and PIN, or your PayPal credentials. The criminals that harvest this information apply it almost immediately...

Comments  (0)

37d5f81e2277051bc17116221040d51c

ATM Security Threats Increase

August 01, 2010 Added by:Robert Siciliano

Skimming today is far more sophisticated than in the past. Skimmers can include blue tooth and texting technology that send the data to the criminal anywhere. Keypads can be compromised by devices that overlay the exiting pad and transfer the data remotely...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Pay Attention to Credit Card Statements

July 29, 2010 Added by:Robert Siciliano

If a credit card company detects irregular spending on your credit card, they may freeze your account or call to verify your identity. While these measures do help secure your card to an extent, they cannot prevent or detect all types of credit card fraud...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Electronic Payment Fraud, Security and Risk Mitigation

July 28, 2010 Added by:Anthony M. Freed

The biggest risk is systematic. Criminals and hackers have multiple points to penetrate a system, so it's important for those responsible for online payment security to think of the possible risks from end-to-end...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Hotels are Hotspot for Credit Card Fraud

July 20, 2010 Added by:Robert Siciliano

According to a recent study, 38% of all credit card breaches occur in hotels. Despite several high profile breaches that recently affected payment processors and banks, the financial services industry only accounts for 19% of breaches...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Old Credit Card Tech Facilitates Skimming Fraud

July 17, 2010 Added by:Robert Siciliano

Skimming occurs when a criminal copies the data stored on your card’s magnetic stripe and burns the stolen data onto a blank card, creating a clone can that be used like any normal credit or debit card...

Comments  (3)

D5e39323dd0a7b8534af8a5043a05da2

Viseca Card Services reduces fraud loss with SAS®

June 17, 2010 Added by:Fred Williams

My company, SAS Institute, in Cary, NC is mainly a business analytics software business.  However, they do a lot of business in the fraud arena and SAS just posted an article detailing how a Swiss credit card company is using SAS to combat fraud.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A history of bot fraud

May 16, 2010 Added by:Javvad Malik

Back in the old days before computers were invented or the Internet was discovered, everything was black and white and there were good guys and bad guys. The bad guys back in the day weren’t too different from those of today. Yeah sure they chewed tobacco, but their motives were the same, they wanted power and money.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

How to Avoid the New BOTNET Herders

March 31, 2010 Added by:Theresa Payton

There’s a new game in town offering jobs to anyone with a home office and a computer.   Be careful what you or your kids accept when applying for jobs online.  You or your kids may be accepting a job working for a cybercriminal outfit.

Comments  (2)

Abceedf5017915685f379075f00a5ccd

Are the days numbered for Chinese handsets in India?

October 09, 2009 Added by:Sudha Nagaraj

In a country with over 400 million mobile phones in use where ten million new phones are being sold every month, a security scare over cheap and illegal handsets imported from China, threatens to silence over 25 million handsets by end November.

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »