A massive breach at the U.S. Office of Personnel Management wasn't discovered by government sleuths - or the Einstein DHS intrusion detection system - but rather during a product demo, a new report says.
Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, medical, financial and professional lives. Because of this, the value of our identities, especially those that can be created from healthcare information is...
How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?
From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports...
A persons PHI can often be so detailed and complete, hackers and fraudsters can refer to it as a "fullz", meaning it contains enough PII to completely take over someone's identity. This makes this information highly valuable to those communities especially as many other types of fraud can also be committed with it....
As data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Over the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works.
Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, financial and professional lives. Because of this, their value is increasing exponentially, thus making their theft far more lucrative. In this opening session...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
See how LifeLock's threat detection, proactive identity alerts and comprehensive remediation services help provide peace of mind for consumers and enterprises amid the growing threat of identity theft. This technology presentation will demonstrate how leveraging unique data, science and patented technology from their...
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? It's not enough to have a breach response strategy. Do you have the right players and pieces in place to execute...
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Part 1: Bitcoin Fraud - The Perfect Crime
Bitcoin, a next-generation crypto-currency whose origin is shrouded in mystery, is receiving growing attention from cybercriminals and is perhaps the largest real-world testing lab for the effects of trust on consumer and business demand. This fascinating presentation will...
Identity theft - or impersonation - is a well-established form of identity risk but first party fraud, and synthetic identities in particular are fast growing and insidious threats that bring with them economic loss for financial institutions, as well as risks of regulatory censure when synthetic identities pass Know...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.