Synthetic identity fraud is more pervasive than most people are aware. Synthetic identities are used to obtain financial services, medical benefits, insurance and rental housing, among other things. Additionally, organized crime and terrorist groups are realizing the benefits that the anonymity of synthetic identities...
In the wake of massive health data breaches, four U.S. Senators are demanding that the Department of Health and Human Services provide details about how it tracks medical ID theft and fraud and assists victims. But is HHS positioned to address the issues?
In today's world of big data and analytics, the demand for unique and meaningful content seems endless. This is great news for online data companies as they seek to tap into new and expanding markets to grow revenue. Yet, as their revenue potential grows, online data companies increasingly fall victim to content theft...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.
Proposed federal legislation calls for testing the use of smart cards, similar to the chip cards being rolled out by the U.S. credit card brands, for Medicare patient identification to help reduce fraud. Kelli Emerick, leader of the Secure ID Coalition, explains the proposal.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But the cybercrime ecosystem is more automated, effective and robust than ever, Trend Micro reports.
The FTC says LifeLock has violated a 2010 settlement by continuing to make deceptive claims about its identity theft protection services. After the FTC made the announcement on July 21, Lifelock's stock value plummeted.
The Department of Justice has announced the indictments of two individuals in separate fraud cases affecting the University of Pittsburgh Medical Center. The cases spotlight the challenges healthcare organizations face in the fight against fraud.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
A massive breach at the U.S. Office of Personnel Management wasn't discovered by government sleuths - or the Einstein DHS intrusion detection system - but rather during a product demo, a new report says.
How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?
From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports...
Nine individuals have pleaded guilty to charges stemming from their roles in an identity fraud scheme. Among the defendants is a former military hospital worker who stole soldiers' personal information to file false federal tax returns, prosecutors say.