Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » identity theft

Articles Tagged with ''identity theft''

New Record High for Identity Fraud

New Record High for Identity Fraud

Sarah Sameei
March 1, 2017

According to Javelin Strategy and Research’s 2017 Identity Fraud Study..


Read More
cyber7-900px.jpg

1 In 4 US Consumers’ Heathcare Data Breached

February 24, 2017

One in four U.S. consumers (26 percent) have had their personal medical information stolen from technology systems, according to results of a survey from Accenture. 


Read More

The Top 10 Things America Fears

February 1, 2017

Chapman University has released its third annual Survey of American Fears, and for the second year in a row, "corruption of government officials" takes the top spot.


Read More
retail3-900px.jpg

Identity Fraud Hits Record High

February 1, 2017

The number of identity fraud victims increased by 16 percent (rising to 15.4 million U.S. consumers) in the last year.


Read More

What Worries Consumers and Businesses the Most?

September 27, 2016

While businesses worry more about the implications of getting hacked, consumers are primarily concerned about personal privacy loss, identity fraud and cyber threats.


Read More
identity theft, fraud prevention, cybersecurity, data theft

Keeping Up with the Criminals through Fraud Detection

Peter Maynard
August 8, 2016

Fraudsters’ methods continually evolve to counter new fraud protection measures and with personally identifiable information, they could steal a customer’s identity or create a synthetic identity. Once a fraudster captures this information, if they are able to access a customer account or open an account, it creates a nightmare scenario with significant repercussions for the business and the customer.


Read More
Payment Data Breach Risks Increase as New Payment Methods Emerge

Payment Data Breach Risks Increase as New Payment Methods Emerge

March 1, 2016

Fifty-four percent of respondents in The Global Study on the State of Payment Data Security, conducted by the Ponemon Institute on behalf of Gemalto, have had a security or data breach involving payment data an average of four times in the past two years. 


Read More
paymentcard

After the EMV Bubble Burst, 3 Problems Persist

Seth Ruden Sr.
February 9, 2016
So, here we are, living in the “future”… many of us now finally have chip cards; the G20 nations are all in the post “liability-shift” world; we’re all expecting to be living in the new paradigm.
Read More
Study: Consumers Rely on Context when Sharing Information/information security, personal information theft, consumer trust, retail security

Study: Consumers Rely on Context when Sharing Information

February 1, 2016

American consumers believe it is acceptable (by a 54 percent to 24 percent margin) for employers to install monitoring cameras following a series of workplace thefts.


Read More

Identity Thieves' Methods and Demographics are Changing

January 1, 2016

As identity theft and fraud become major moneymakers for criminals, the profile of a typical identity thief is changing


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing