2 min read - With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.
3 min read - The delicate balance between a seamless customer experience and quality security controls is one that online banking portals need to manage.
3 min read - Criminals may use synthetic identities to execute buy-and-ship fraud schemes, purchasing cars with false details with no intent of paying.
6 min read - The holiday season is upon us and charity fraud is a concern once again, just as it has been in the past. Here's what consumers need to know.
8 min read - Tax refund fraud is catching the attention of cybercriminals, who are committing identity theft to claim a piece of this billion-dollar industry.
3 min read - Private enterprises can learn a lot from agencies tied to the health care industry, some of which are leveraging analytical tools to curb Medicare fraud.
3 min read - The Carbanak banking malware, which was recently reported by Kaspersky Lab, is potentially the most advanced malware design to date.
5 min read - Though medical identity theft has become a major issue in recent years, many people are not aware of how catastrophic a breach could be for them.
5 min read - Child identity theft is the darker side of synthetic identity fraud and can have a detrimental effect on a child's future if it goes undetected.
6 min read - Synthetic identity theft fraudsters apply for credit directly with a lender, use the authorized user provision of a credit card account and furnish data.
2 min read - Cybercriminals have developed and implemented ATM malware designed to withdraw cash directly from ATMs without compromising consumers' debit cards.
4 min read - Knowing money mules work for organizations to transfer illegally acquired money. The following are a few different ways these mules tend to operate.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.