As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID theft incident that resulted in tax refund fraud, and a related class action lawsuit, illustrate that insider threats are a major ongoing challenge, two privacy experts say.
See how LifeLock's threat detection, proactive identity alerts and comprehensive remediation services help provide peace of mind for consumers and enterprises amid the growing threat of identity theft. This technology presentation will demonstrate how leveraging unique data, science and patented technology from their...
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? It's not enough to have a breach response strategy. Do you have the right players and pieces in place to execute...
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Steph Warren, CIO of the U.S. Department of Veterans Affairs, provides an overview of the VA's cybersecurity landscape and reveals what security issue keeps him up at night.
Part 1: Bitcoin Fraud - The Perfect Crime
Bitcoin, a next-generation crypto-currency whose origin is shrouded in mystery, is receiving growing attention from cybercriminals and is perhaps the largest real-world testing lab for the effects of trust on consumer and business demand. This fascinating presentation will...
Identity theft - or impersonation - is a well-established form of identity risk but first party fraud, and synthetic identities in particular are fast growing and insidious threats that bring with them economic loss for financial institutions, as well as risks of regulatory censure when synthetic identities pass Know...
A House subcommittee is floating draft legislation aimed at fighting Medicare and Medicaid fraud and abuse, by, among other things, eliminating Social Security numbers from Medicare ID cards.
News of another massive hacker attack in the healthcare arena offers more proof that hackers are now hitting organizations in this sector because they're perceived as easier targets than those in other sectors, information security experts say.
Healthcare fraud will increasingly be linked to some form of cybercrime, says Brendan Johnson, U.S. attorney in South Dakota, whose office is ramping up its anti-fraud efforts.
Healthcare organizations are being increasingly targeted by cybercriminals for valuable PII. Is your organization's data secure?
An Identity Theft Resource Center survey determined that healthcare organizations suffered 43 percent of all data breaches reported in 2013, and a stolen medical record is worth three...
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
Fighting fraud tied to synthetic identities requires revamping the credit infrastructure to improve detection of fraudsters' activities, says risk management specialist Richard Parry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.