Fraud Prevention

Fraud Prevention news, information, and how-to advice

stack of credit cards in isolated white 000001679406
moviesec

Fraud definition

Sleeping companies lose big from employee, executive fraud

Companies that fail to continually watch for employee and executive fraud typically lose 5 percent of revenues each year to insider cunning, which amounts to nearly $3.7 trillion globally, a report found

credit cards generic

Retailers plodding toward accepting higher-security payment cards

Target is speeding up support for chip-and-PIN payment cards to restore consumer confidence shaken by last year's massive data breach. But many other retailers feel less of an urgency to adopt the more secure technology.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

New BitCrypt ransomware variant distributed by bitcoin stealing malware

Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied

Hacker Diabl0 arrested in Thailand at the request of Swiss authorities

He is wanted in connection with computer fraud and credit card information theft in Switzerland

20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade.

Why Are Customers Really Deploying an NGFW?

It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says

Recently leaked Mt. Gox data archive contains a malicious application that steals Bitcoin wallet files, a researcher from Kaspersky Lab said

Energy sector a prime target for cyber attacks

Experts say the nation's critical infrastructure remains woefully vulnerable

Source code for Android iBanking bot surfaces on underground forum

The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said

5 Ways Dropbox for Business Keeps Your Data Protected

Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how we've built Dropbox for Business to keep data safe for all our users.

Cybercriminals compromise home routers to attack online banking users

Attackers changed the DNS configuration of vulnerable home routers to mount man-in-the-middle attacks against users in Poland

Building control systems can be pathway to Target-like attack

Credentials stolen from automation and control providers were used in Target hack

Suspected data breach at Holiday Inn, Marriott hotels

A large hotel management company says attackers may have compromised its point-of-sale devices

Arts and crafts chain Michaels investigates possible data breach

The company has not confirmed a compromise but is notifying customers in advance

What is this "File Sync" Thing and Why Should I Care About It?

All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no surprise that 55% of information workers in North America and Europe who use a tablet at work are using file sync and

Neiman Marcus says malware defeated its security

The retailer's CIO writes that the company exceeded security recommendations for handling card data

The 8 most significant ways physical security has evolved

From RFID badges to facial recognition, physical security has changed quite a bit over the years. We walk you through the most significant changes we've seen so far

Officials: Two people used fake credit cards that may be linked to Target data breach

Police didn't say if the pair were directly involved in the data breach or merely purchased stolen card information

Two coders closely tied to Target-related malware, security firm says

Underground forum postings indicate both may have used the same online nickname, according to IntelCrawler

Load More