Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Fraud

Below you will find reports with the tag of “Fraud”

image from The New Gold Rush

The New Gold Rush

In light of the new development of Crypto Currency, this paper can begin to address important questions about the outlook for digital currencies, including: If individuals lose trust in alternative coins and no longer see them as profitable, then what does this mean for the future of cryptocurrencies? How will the cryptocurrency landscape change in 2018? And will cryptocurrency fraud ultimately obstruct the rapid growth of digital currencies worldwide?

(more available)
Added: December 5, 2018
image from Luxury Brands, Cheap Domains: Why Retailers Are Losing The Fight Against Online Counterfeiting

Luxury Brands, Cheap Domains: Why Retailers Are Losing The Fight Against Online Counterfeiting

To lure unsuspecting consumers to fake websites to purchase counterfeit goods, cybercriminals abuse the Domain Name System (DNS) – every day, every hour, every minute. In this report, “Luxury Brands, Cheap Domains: Why Retailers Are Losing The Fight Against Online Counterfeiting,” cybersecurity firms Farsight Security and DomainTools, the leaders in DNS intelligence, took a close look at four international luxury brand domains and learned that the potential abuse of their brand, by counterfeiting and other malicious activities, is significant.

(more available)
Added: December 5, 2018
image from Cyber Threat Brief: The 2018 FIFA World Cup

Cyber Threat Brief: The 2018 FIFA World Cup

Russia will host the 2018 FIFA World Cup from 14 June to 15 July 2018 at 12 different venues throughout 11 host cities, and thousands of foreign visitors are expected to travel to the games. With major sporting events increasingly targeted by physical and cyber threats, we believe that FIFA and their affiliates, spectators, athletes, officials, or other attendees are likely to be confronted by a range of security risks such as protests/demonstrations, hooliganism, financial fraud, and to a lesser extent hacktivism, terrorism, and cyber espionage.

(more available)
Added: November 29, 2018
image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users. Protecting Android, iOS, and Windows mobile device users from fraud will require a concerted effort by all stakeholders to eliminate vulnerabilities, encourage security‐minded behaviors, and to leverage all the security benefits that mobile devices have to offer.

(more available)
Added: November 27, 2018
image from Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy, commissioned by Nok Nok Labs and produced by Aite Group, explores current attitudes and trends in developing an organization-wide consumer authentication strategy.

(more available)
Added: November 27, 2018
image from Why Device Age Matters

Why Device Age Matters

Cybercriminals will use any and all devices available to them in order to lie, cheat and steal from you. Until they’re blocked. Then they switch to different devices, counting on your fraud prevention efforts to forget about their old devices. When that happens, they start using their old devices again. They would love for you to believe that device history isn’t important. That’s why your fraud prevention tools shouldn’t forget older devices either. It’s essential to know when a device, especially one that’s new to your business, has a history of fraud. Even if that fraud happened years ago.

(more available)
Added: November 24, 2018
image from What The Internet Of Things Means For Consumer Privacy

What The Internet Of Things Means For Consumer Privacy

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

(more available)
Added: November 24, 2018
image from Definitive Guide To Next-Generation Fraud Prevention

Definitive Guide To Next-Generation Fraud Prevention

This e-book offers insight into online fraud and cyber-crime.

Added: November 24, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. The national online survey included 800 fraud mitigation professionals from five industry segments and government with oversight or direct involvement in fraud programs at their organizations. It has a margin of error of +/- three points (at the 95% confidence level), and LexisNexis was not identified as the research sponsor.

(more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from 2018 Unisys Security Index Australia Report

2018 Unisys Security Index Australia Report

This report provides insight into the public concern about security issues in Australia in 2018.

Added: November 21, 2018
image from Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

This report offers insight into the Iranian threat agent Greenbug.

Added: November 15, 2018
image from University Challenge: Cyber Attacks In Higher Education

University Challenge: Cyber Attacks In Higher Education

A report by VMware exploring the evolving threat for UK universities and how they can guard against cyber attacks to preserve their intellectual property

(more available)
Added: November 6, 2018
image from Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

This paper cites a Dimensional Research survey of 250 IT security professionals in financial services organizations located in the U.S., U.K., Germany, France and Australia. The survey examines the challenges faced by the financial services industry in managing certificates, and the results illustrate the importance of incorporating CA-agility into a certificate management strategy. The survey also explores the federal government and other industries, including healthcare, retail and technology.

(more available)
Added: November 6, 2018
image from Measuring the Impact of DMARC's Part In Preventing Business Email Compromise

Measuring the Impact of DMARC's Part In Preventing Business Email Compromise

Since June 2016, the Global Cyber Alliance (GCA) has been working to accelerate adoption of DMARC, an email security standard, by providing a set of easy-to-use tools and campaigns to drive deployment. This paper investigates and measures the economic benefit from that work. Having reviewed the available data, we have chosen to focus on Business Email Compromise (BEC) because it is a rapidly growing issue, with high direct losses, and relevant data is available for analysis from multiple sources. We derive a conservative minimum bar estimate for the loss avoidance tied to GCA’s initiatives and discuss the potential scale of other benefits gained from DMARC.

(more available)
Added: November 4, 2018
image from Combating False Declines Through Customer Engagement

Combating False Declines Through Customer Engagement

Based on quantitative consumer research, the report looks at the likelihood that false declines at the point of sale (POS) will prompt consumers to leave their financial institution (FI). The report also looks at technologies that can reduce false declines as well as consumers’ propensity to proactively engage with these technologies.

(more available)
Added: October 26, 2018
image from Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events. The report should provide valuable information that can be used by businesses and policymakers as they develop policies and best prac-tices related to information security and data breach response. More- over, it should be of interest to individuals who conduct business with any organization that holds their personal and confidential data.

(more available)
Added: October 26, 2018
image from Internet Organized Crime Threat Assessment 2017

Internet Organized Crime Threat Assessment 2017

This is the fourth annual presentation of the cybercrim threat landscape by Europol’s European Cybercrime Centre.

Added: October 26, 2018
image from Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

The Qadars Banking Trojan has been observed globally targeting well-known banks since 2013. The research in this white paper provides a detailed analysis of the banking trojan, discussing the obfuscation techniques, domain generation algorithm (DGA), communication protocols and data formatting, and social engineering techniques employed by the trojan.

(more available)
Added: October 26, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report April 2016

SecureWorks Threat Intelligence Executive Monthly Report April 2016

This report from April 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 26, 2018
image from SilverTerrier: The Next Evolution In Nigerian Cybercrime

SilverTerrier: The Next Evolution In Nigerian Cybercrime

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 00:08 UTC (build b1d7be4)