Identity fraud / theft - News, Features, and Slideshows
A 28-year-old man was sentenced to more than nine years in prison Wednesday for buying stolen credit and debit card numbers from an underground online marketplace.
By Jeremy Kirk | 13 November, 2014 12:23
The FBI this week said it had nabbed one of the agency's Cyber's Most Wanted outlaws -- John Gordon Baden who is charged with stealing the identities of 40,000 people and then using the information to siphon millions of dollars from brokerage or bank accounts.
By Michael Cooney | 06 November, 2014 08:16
In an effort to make to make Internet and mobile transactions more secure, American Express has launched a new service that aims to replace payment card numbers with unique tokens.
By Lucian Constantin | 04 November, 2014 02:28
Cybercriminals have a new tool to make the most of stolen credit card details before payment processors detect the fraud, security researchers warn.
By Lucian Constantin | 30 October, 2014 04:54
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
By Lucian Constantin | 24 October, 2014 06:04
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTProgram Manager - Integration & SolutionsNSW
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTSenior SEO ManagerNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices.
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale
- Symantec identifies sophisticated, stealthy 'Regin' malware
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more
- Reports: EU taking first step towards breaking up Google
- Double-edged feedback sword nicks Microsoft over OneDrive
- The ups and downs of Microsoft Band
- US man sentenced for hacking POS systems at Subway