Your Search returned 12 results from our Editorial content

Sort By
  • Close-button

    Fraud Detection & Prevention

FRAUD DETECTION & PREVENTION

Five steps to prevent enterprise voice fraud

Voice fraud is on the rise… but what can you do about it?

FRAUD DETECTION & PREVENTION

Featurespace: ‘Accidental’ revenue via machine-learning-driven...

Martina King, CEO of Featurespace describes an innovative approach to fraud detection from Cambridge, UK

   

FRAUD DETECTION & PREVENTION

Insider fraud: The risks posed by call centre employees...

The CEO of Aeriandi explores the growing risk of fraud from an organisation’s own employees and what can be done to minimise it

IDENTITY FRAUD & THEFT

Bogus Facebook hacking tool dupes users

Symantec has seen another round of a ham-fisted but surprisingly successful attack that targets Facebook users hoping to break into their friends' accounts.

   

SECURITY

Cybercriminals compromise home routers to attack online...

Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online...

SECURITY

One in three victims of Target card breach could face fraud...

One in three data breach victims in 2013 later experienced fraud, according to a survey released Wednesday, a sharp increase that doesn't bode well for millions...

   

DATA PRIVACY AND SECURITY

Suspected data breach at Holiday Inn, Marriott hotels

Lodgers at Holiday Inns, Marriott and Renaissance hotels may have had their payment card details compromised following a new disclosure on Monday of suspected point-of-sale...

DATA PRIVACY AND SECURITY

Target-related malware was a side job for man living in...

In a surprising TV interview, a 23-year-old living in Russia said he helped code a software program that experts believe was eventually modified to steal tens of...

   

FRAUD DETECTION & PREVENTION

Sheep: A $110 Million Raid & 96,000 Stolen Bitcoins…

At the start of the month word began to spread of the biggest online robbery of all time. As the dust settles, we take a look at how crowbars and balaclavas have...

FRAUD DETECTION & PREVENTION

When Crowdfunding Gets Sinister

Crowdfunding is great for getting left-field innovation off the ground. But what happens when all is not as it seems and fraudsters get involved?

   
   
Previous 1

Your Search returned 28 results from our White Paper Library

Sort By
  • Close-button

    Fraud Detection & Prevention

Akamai

Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...


IBM

Fraud Detection & Prevention

Recognize the Many Faces of Fraud

IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance...


IBM

Fraud Detection & Prevention

Reduce Tax Fraud with Predictive Analysis

IBM SPSS Predictive Analytics solutions can help maximize your revenue by focusing your investigations on cases that are likely to yield the biggest positive...


Tibco Software, Inc

Quality Control

Warranty and Quality Analytics: Improving Profitability...

This paper reviews the emerging trends in warranty & quality management and examines the benefits analytics can bring to companies.


IBM

Fraud Detection & Prevention

Fighting Fraud with Big Data Visibility and Intelligence...

This report reveals how solution providers are fighting fraud with big data visibility and intelligence.


McAfee

Endpoint Security

Seven Key Features to Help You Stop Advanced Evasion Techniques...

This paper lists seven critical features your network security should incorporate to defend against AETs.


Symantec Corporation

Internet Security

Internet Security Threat Report Volume 20

Get the latest on the threat landscape with an up-to-date overview, analysis and key findings report from Symantec.


Riskified

Fraud Protection

Fraud Prevention: The Responsibility of Senior Management...

This paper looks at the value of fraud management operations in the era of eCommerce.


Riskified

Security

Overcoming False Positives: Saving the Sale and the Customer...

This whitepaper analyzes the prevalence of false-positive declines in the USA, explores key consumer segments affected by incorrect declines and presents...


Symantec Corporation

Internet Security

Internet Security Threat Report 2015

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity.


Previous 1 3

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?