Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Fraud

Below you will find reports with the tag of “Fraud”

image from Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

From the Report, “A common refrain from community banks and credit unions is that since they are not experiencing a fraud attack at the moment, they don’t see any need to invest in fraud protection. Now apply the same logic elsewhere – it follows then, that purchasing home insurance doesn’t make sense, as my house isn’t currently on fire. This kind of reasoning is short-sighted and leaves banks and their customers vulnerable to fraud–related financial losses. It also ignores a growing, if unfortunate, precedent – that losses from cyberattacks number in the billions of dollars annually (one report put it as high as $445 billion), and it continues to rise every year.”

(more available)
Added: October 22, 2018
image from Quarterly Report Q3 2017

Quarterly Report Q3 2017

This is a quarterly report that looks at cyber security issues in New Zealand and around the world.

Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices.

(more available)
Added: October 22, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer.

(more available)
Added: October 21, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from Banking On The Customer To Make Open Banking A Success

Banking On The Customer To Make Open Banking A Success

This paper offers a unqiue look into the complications surrounding that adoption of compliant banking solutions. It seeks to help create simple but compliant solutions that customers accept.

(more available)
Added: October 21, 2018
image from Email Impersonation Attacks: A Clear And Present Danger

Email Impersonation Attacks: A Clear And Present Danger

Sponsored by Valimail, Email Impersonation Attacks: A Clear & Present Danger, was conducted by Ponemon Institute to understand the challenges organizations face to protect end-users from email threats, such as impersonation attacks.

(more available)
Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from Enterprise Mobile Security Pulse Report Q3 2017

Enterprise Mobile Security Pulse Report Q3 2017

This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis.

(more available)
Added: October 21, 2018
image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Malicious Bots On Property Portals

Malicious Bots On Property Portals

The Malicious Bots on Property Portals - Avoiding Common Engineering Pitfalls eBook is the re- sult of analyses conducted on some of the top property portals (aka, real estate websites) in the world. The report outlines various hidden issues found in property portals that can be exploited to scrape data.

(more available)
Added: October 21, 2018
image from Modern Database Architecures Demand Modern Data Security Measures

Modern Database Architecures Demand Modern Data Security Measures

The objective of this report is to provide an understanding into how companies are approaching the challenges of evolving database ecosystems though cloud and big data initiatives. And to understand what steps organizations are taking to ensure greater security and compliance with their databases.

(more available)
Added: October 21, 2018
image from Quarterly Report Q2 2017

Quarterly Report Q2 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 21, 2018
image from Quarterly Threat Report Q3 2017

Quarterly Threat Report Q3 2017

This Quarterly report offers key takeaways from the third Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 21, 2018
image from Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware has been reborn in the Android ecosystem, particularly on Google Play. This research paper reveals that hundreds of antivirus and optimization tool apps on Google Play mislead users into believing that they have a virus or performance problems on their devices to manipulate them to install other fake tools.

(more available)
Added: October 21, 2018
image from Stop Advanced Automated Attacks That Go Undetected

Stop Advanced Automated Attacks That Go Undetected

If you are interested in looking about Bots that go undetected, this paper is for you.

Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from Advancing To Bot Management And Security

Advancing To Bot Management And Security

This report discusses the use of Bots in managing security risks for an organization. It specifically discusses the issures related to credential stuffing.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 11, 2025 20:08 UTC (build b1d7be4)