Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

The report covers a variety of issues but offers these key findings, Sometimes an “attack” isn’t exactly what it first appears to be, Bots are big money for attackers and they’re constantly evolving, Mental health issues cost U.S. businesses more than $190 billion a year in lost earnings. Read on for more information.

(more available)
Added: January 31, 2019
image from The 2019 State of Password and Authentication Security Behaviors Report

The 2019 State of Password and Authentication Security Behaviors Report

The purpose of this study is to understand the beliefs and behaviors surrounding password management and authentication practices for individuals both in the workplace and at home. The goal was to understand if these beliefs and behaviors align, and why or why not. The conclusion is that despite the increasing concern regarding privacy and protection online and a greater understanding of the best security practices, individuals and businesses are still falling short.

(more available)
Added: January 31, 2019
image from The Changing Face of Online Banking and Financial Fraud

The Changing Face of Online Banking and Financial Fraud

This report seeks to review the dramatic changes that took place in the banking industry in 2018, and lay out a strategy for those institutions in 2019.

(more available)
Added: January 31, 2019
image from Forging Documents in the Deep and Dark Web

Forging Documents in the Deep and Dark Web

This report offers insight into forged documents online. And how they are traded and used to commit identity fraud or evade authorities.

(more available)
Added: January 31, 2019
image from Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

From the report, “DOur objective was to (1) summarize unclassified and classified reports issued and testimonies made from the DoD oversight community and the Government Accountability Office (GAO) between July 1, 2017, and June 30, 2018, that included DoD cybersecurity issues; (2) identify cybersecurity risk areas for DoD management to address based on the five functions of the National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity,” April 16, 2018 (Cybersecurity Framework); and (3) identify the open DoD cybersecurity recommendations. This summary report also addresses the Federal Information Security Modernization Act of 2014 (FISMA) requirement to provide an annual independent evaluation of the agency’s information security program by using the identified findings to support the responses made in our assessment.”

(more available)
Added: January 31, 2019
image from CVE Publishing: A Race to Protect Against Dark Web Threat Actors Trying to Exploit

CVE Publishing: A Race to Protect Against Dark Web Threat Actors Trying to Exploit

This is a threat focus report on Drupalgeddon2

Added: January 31, 2019
image from Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

This Impact Report provides insights into consumers’ views on authentication. Consumers often don’t understand the mechanics of technologies very well, or even why they’re being used, but they have definite preferences about how and when they want to engage in authentication activities.

(more available)
Added: January 31, 2019
image from Web-Based Crypto Wallet Hijacking

Web-Based Crypto Wallet Hijacking

Recently, cybercriminals have managed to redirect web-based crypto-wallet DNS queries to a malicious mirror website. By doing so, they were able to steal $17m in Ethereum. The hackers pulled off a BGP (Border Gateway Protocol) hijacking attack on the website’s DNS service host, causing it to receive a false IP address and direct users to a phishing website. As a result, the users became victims of the attack, losing their stored wallet’s crypto-currency.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report

2018 Webroot Threat Report

The 2018 edition of Webroot’s annual Threat Report shares a glimpse into their discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime.

(more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report: Mid-Year Update

2018 Webroot Threat Report: Mid-Year Update

The Webroot Threat Research Team has analyzed the data from our customer base during the first half of 2018. This mid-year threat report not only shows the stats, but also tells the story behind the headlines. The bottom line from our observations: it has never been more important to implement a robust, effective, multi-layered and continuously evolving security approach to keep valuable data and systems secure.

(more available)
Added: January 31, 2019
image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
image from The Path To Digital Transformation

The Path To Digital Transformation

This report offers insight into controlling friction while tackling Cybercrime in Financial Services.

Added: January 30, 2019
image from Global eCommerce Transaction and Fraud Trends Q2 2018

Global eCommerce Transaction and Fraud Trends Q2 2018

This infographic provides a brief overview of data presented in the ThreatMetrix Q2 2018 Cybercrime Report.

Added: January 30, 2019
image from ThreatMetrix Cybercrime Report

ThreatMetrix Cybercrime Report

The ThreatMetrix Payment Processor Cybercrime Report is based on actual cybercrime attacks last year that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Gaming & Gambling Report

Q2 2018 Gaming & Gambling Report

The ThreatMetrix Gaming and Gambling Cybercrime Report is based on actual cybercrime attacks in Q2 2018 that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Cybercrime Report

Q2 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q2 2018 is based on actual cybercrime attacks from April – June 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q1 2018 Cybercrime Report

Q1 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2018 Cybercrime Report: Europe DeepDive

2018 Cybercrime Report: Europe DeepDive

The ThreatMetrix European Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report 2017: A Year In Review

Cybercrime Report 2017: A Year In Review

This report offers insight into the cybercrime events of 2017.

Added: January 30, 2019
image from Q4 2017 Cybercrime Report

Q4 2017 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q4 2017 is based on actual cybercrime attacks from October – December 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Q3 Cybercrime Report

2017 Q3 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q3 2017 is based on actual cybercrime attacks from July – September 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. • The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 51% of which originate from mobile devices. • These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. • The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. • ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. • Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
  • ««
  • «
  • 32
  • 33
  • 34
  • 35
  • 36
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 12:08 UTC (build b1d7be4)