Items Tagged with 'fraud'

ARTICLES

Report Says 5 Percent of Organizational Revenues Lost to Internal Theft

No Comments

Organizations around the world lose an estimated 5 percent of their annual revenues to occupational fraud, according to a survey of Certified Fraud Examiners (CFEs).


Read More

Survey Says Card Fraud Biggest Security Concern for U.S. Consumers

No Comments

Credit and debit card fraud tops Americans' security concerns in 2014, against a recent backdrop of major retail and banking security breaches, according to the 2014 Unisys Security Index.


Read More

Judge Rules FTC can Sue Wyndham over Cyber Security Lapses

No Comments

A federal judge ruled that the U.S. Federal Trade Commission can sue hotel group Wyndham Worldwide over alleged poor data security.


Read More

Fraud Plot Foiled at Vatican Bank

No Comments

Two men with false bond certificates worth trillions of euros (dollars) tried to bluff their way into a Vatican bank in a foiled fraud plot.


Read More

China Seizes $14.5 Billion Assets From Ex-Security Chief

No Comments

Chinese authorities have seized assets worth at least 90 billion yuan ($14.5 billion) from family members and associates of retired domestic security tsar Zhou Yongkang.


Read More

California AG says State is Targeted by 'Cyber-Gangs'

No Comments

California's Attorney General says cycber criminals are increasingly focusing on California because of its wealth and innovation.


Read More

Identity Thieves Targeting Tax Returns

No Comments

Identity theft is already a serious problem—the No. 1 complaint to the Federal Trade Commission, and tax-related identity theft is a growing part of this crime spree.


Read More

Neiman Marcus Reports CyberSecurity Breach

No Comments

Retailer Neiman Marcus said that thieves stole some of its customers' payment card information and made unauthorized charges over the holiday season.

Ginger Reeder, spokeswoman for Dallas-based Neiman Marcus Group Ltd., said in an email that the retailer had been notified in mid-December by its credit card processor about potentially unauthorized payment activity following customer purchases at stores, said AP. On Jan. 1, a forensics firm confirmed evidence that the upscale retailer was a victim of a criminal cyber-security intrusion and that some customers' credit and debit cards were possibly compromised as a result, said AP.

Reeder wouldn't estimate how many customers may be affected but said the merchant is notifying customers whose cards it now knows were used fraudulently. Neiman Marcus, which operates more than 40 upscale stores and clearance stores, is working with the Secret Service on the breach, said AP.

"We have begun to contain the intrusion and have taken significant steps to further enhance information security," Reeder wrote.


Read More

Firm Sues Bank over Cyberheist

No Comments

A California escrow firm that was forced out of business last year after a $1.5 million cyberheist is now suing its former bank to recoup the lost funds.


Read More

Shrink in 2012 Cost Retailers $112 Billion, Averaging 1.4% of Sales

No Comments

Shrink, comprised of shoplifting, employee or supplier fraud, organized retail crime and administrative errors, cost the retail industry more than $112 billion globally last year, according to the 2012-2013 Global Retail Theft Barometer, and represented 1.4 percent of retail sales, on average.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+