Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Fraud

Below you will find reports with the tag of “Fraud”

image from Cybercrime against Businesses, 2005

Cybercrime against Businesses, 2005

This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005.

Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

While the use of the dark web as facilitators for illicit drug trade has increasingly been the subject of research by a number of academics, little has been done to conduct a systematic investigation of the role of the dark web in relation to the illegal arms trade, drawing on the insights offered by primary data. To address this gap, and with a view to support- ing policy and decision makers, RAND Europe and the University of Manchester designed this research project.

(more available)
Added: October 24, 2018
image from Customer Communications Report

Customer Communications Report

This report is based on the survey results conducted by TeleSign. It seeks to understand how businesses are using cloud communications to fuel growth.

(more available)
Added: October 24, 2018
image from Cybercrime Tactics And Techniques Q1 2017

Cybercrime Tactics And Techniques Q1 2017

The second edition of this report, looking at noteable threats during the first three months of the year.

Added: October 24, 2018
image from FDA Should Further Integrate Its Review of Cybersecurity Into the Premarket Review Process for Medical Devices

FDA Should Further Integrate Its Review of Cybersecurity Into the Premarket Review Process for Medical Devices

This report from the U.S. Department of Health And Human Services, offers insight into how the FDA has taken steps to address emerging cybersecurity concerns in networked medical devices by issuing guidance, reviewing cybersecurity information in submissions, and—when needed—obtaining additional information from manufacturers. It also discusses how the FDA could take additional steps to more fully integrate cybersecurity into its premarket review process.

(more available)
Added: October 24, 2018
image from Insuring The Future: 2018 State Of Cyber Resilience For Insurance

Insuring The Future: 2018 State Of Cyber Resilience For Insurance

“Across all technologies and capabilities examined in the survey, about 80 percent or more of insurance executives are “confident” or “extremely confident” about their effectiveness. That might seem reasonable given the progress, but a case can be made that leadership is overconfident. Attackers are becoming increasingly sophisticated and attacks can shut down the business or expose customer data. If about one in five attempted breaches is successful, that’s still a lot of breaches. And, given the findings that 45 percent of breaches are not detected for more than a week (9 percent require more than a month), that’s a lot of risk exposure.”

(more available)
Added: October 24, 2018
image from The Importance Of Knowing Your Device In A Mobile-First World

The Importance Of Knowing Your Device In A Mobile-First World

This white paper will examine “Know Your Device” (KYD) as a method to not only protect against fraud, but also enhance your customer’s digital channel experiences and compete in a crowded marketplace.

(more available)
Added: October 24, 2018
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided.

(more available)
Added: October 24, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.

(more available)
Added: October 23, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from ISTR Financial Threats Review 2017

ISTR Financial Threats Review 2017

This special report examines threats to the financial sector.

Added: October 23, 2018
image from Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

If you are looking for insight into the growing world of mobile payments, and the security surrounding those transactions, this paper is for you.

(more available)
Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
image from Stacking The Odds Against The Fraud

Stacking The Odds Against The Fraud

This paper provides answers for how marketing and fraud can work together to help online gambling operators to win.

Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

This paper seeks to help mitigate serious crimes related to mobile security and credential fraud.

Added: October 22, 2018
image from Enterprise Mobile Security Pulse Report Q4 2017

Enterprise Mobile Security Pulse Report Q4 2017

The Appthority Enterprise Mobile Security Pulse Report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during our deep app analysis.

(more available)
Added: October 22, 2018
image from ISTR Email Threats 2017

ISTR Email Threats 2017

This special report analyzes Email and the threats that occur in that environment.

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 00:08 UTC (build b1d7be4)