Your Search returned 9 results from our Editorial content

Sort By
  • Close-button

    Identity Fraud & Theft


Bogus Facebook hacking tool dupes users

Symantec has seen another round of a ham-fisted but surprisingly successful attack that targets Facebook users hoping to break into their friends' accounts.


Netcraft tool flags websites affected by Heartbleed

Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.



EA Games site hacked to steal Apple IDs

An Electronic Arts website was hacked in a phishing scheme aimed at the acquisition of Apple IDs and credit card numbers, security researchers reported Wednesday....


One in three victims of Target card breach could face fraud...

One in three data breach victims in 2013 later experienced fraud, according to a survey released Wednesday, a sharp increase that doesn't bode well for millions...



Internet Archive, fearful of spying, boosts its encryption...

The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other's prying eyes -- like the government's.


Cybercrime service automates creation of fake scanned IDs,...

A new Web-based service for cybercriminals automates the creation of fake scanned documents that can help fraudsters bypass the identity verification processes used...



Reports: Edward Snowden seeks asylum in Russia

Edward Snowden, the leaker of documents that revealed National Security Agency surveillance programs, has submitted a request for temporary asylum in Russia and...


Google adds malware, phishing numbers to its transparency...

Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer....



Australian Cyber-Cops Target Romanian Scammers

Internet fraud isn't a new problem, so why are people still being caught out? This article looks at the prevalence of internet fraud in Australia and what the government...


Your Search returned 12 results from our White Paper Library

Sort By
  • Close-button

    Identity Fraud & Theft


Data Privacy and Security

2010 Financial Services Global Security Study

This global report from Deloitte reveals security practices in financial institutions around the world. Discover how leading companies are protecting themselves...

Symantec Corporation


Norton Cybercrime Report 2011

431 million people around the world become victims of cybercrime every year. This report reveals the latest stats from around the world, with a tailored...

EMC Corporation

Identity Fraud & Theft

Online Identity Risk Calculator

Is your Personal Online Identity at Risk? Do you understand your current level of exposure to identity theft? Play the game to find out your personal identity...


Fraud Detection & Prevention

2013/14 Global Fraud Report

This latest Global Fraud Report from Kroll, details global survey results and research into fraud and corruption around the world.


Fraud Detection & Prevention

Prevent Insurance Crime with the Four Cornerstones of Better...

This Forrester report reveals how organizations can combat fraud in the insurance industry.


Fraud Detection & Prevention

IBM's Smarter Counter Fraud Initiative: A Comprehensive,...

Read this Clabby Analytics report and discover a comprehensive, unique and aggressive approach to real-time fraud prevention.


What is an Identity Provider? Why Does My Company Need to...

This paper discusses why enterprises should become Identity Providers.


Dynamic Authentication: Smarter Security to Protect User...

This IDC paper explores emerging trends in authentication that are driving a need for stronger user access control.



Infographic: ForgeRock Customers Maximise Their Customer...

This infographic details the return of investment ForgeRock users have seen on their customer identity management solution.



Infographic: ForgeRock Customers Maximise Their Customer...

This infographic details the return of investment ForgeRock users have seen on their customer identity management solution.

Previous 1



Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society


China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?