Skip to navigation

InfoRiskToday.com

spacer
  • USA
  • UK
  • Europe
  • India
  • Asia
  • Sign In
  • Subscribe
  • Home
  • ID Theft

ID Theft

The Latest News

  • Interview

    How Phishing Attacks Are Evolving

    Poor Internet Hygiene Enables Criminal Activity By Tracy Kitten
    spacer

    Phishing attacks are up, and the methods are changing. Paul Ferguson of the Anti-Phishing Working Group explains how phishers are fine-tuning their schemes and exploiting cross-platform technologies.

  • Article

    BofA Confirms Third-Party Breach

    Bank Spokesman: Customer Data is Secure By Tracy Kitten
    spacer

    Bank of America confirms hacktivists' reports about a breach of a third-party service provider working with the bank to analyze public data. How did the breach occur, and what information was exposed?

  • Interview

    Report: 28% of Breaches Lead to Fraud

    New ID Fraud Report Studies Consumer Impact of Breaches By Tracy Kitten
    spacer

    New research says more than 25 percent of consumers hit by a data breach later become victims of identity fraud - especially when payment card information is exposed. Javelin's Al Pascual shares analysis.

  • Article

    Defending Against 'Blitzkrieg' Trojan

    Researcher Reviews New Findings About Gozi-Prinimalka By Jeffrey Roman
    spacer

    The Gozi Trojan variant known as Prinimalka is expected to target 30 banking institutions in spring 2013. Now McAfee researcher Ryan Sherstobitoff says new research sheds light on how to prepare.

  • Article

    Preventing Insider Medical ID Theft

    Recent Cases Spotlight Fraud Risks By Marianne Kolbasuk McGee
    spacer

    Three recent identity theft incidents highlight the need for healthcare organizations to stay vigilant in preventing fraud involving insiders. Security experts offer advice.

More news...

White Papers

  • How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals

    spacer

    Learn how to prevent spear phishing - the latest and most dangerous technique in the cybercriminal's arsenal - from infiltrating your networks and compromising your customer data, intellectual...

  • Reaping the "Trust Dividend" - Federal Agencies Can Move Services Online Now with an Identity Button (Like Facebook) - and Save Billions

    spacer

    The move of paper-based transactional services online doesn't create just cost savings and efficiencies. E-Gov creates a "Trust Dividend," thanks to the use of trustable online identities - issued by...

  • The Three Pillars of Trust: Adopting a New Service Architecture for Trusted Transactions with Government on the Internet

    spacer

    All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have...

Webinars

  • Security Readiness: How to Combat Healthcare IT Security Threats

    Since August of 2009, 552 large-scale breaches of PHI have been reported to HHS, impacting nearly 22 million people. OCR recently reported (somewhat to their surprise) that over two-thirds of the...

  • Misplaced Trust in the Mobile Platform

    Metaforic will host a mobile security webinar with an additional speaker from Forrester. The one-hour session will provide an overview of the latest mobile threats, and will discuss in detail the...

More webinars...
ARTICLE Healthcare BYOD Perspectives

While some healthcare organizations are quickly rolling out privacy and security policies for...

Latest Tweets and Mentions

ARTICLE Healthcare BYOD Perspectives

While some healthcare organizations are quickly rolling out privacy and security policies for...

The ISMG Network

  • spacer
    Webinar

    Vendor Management Part I: FDIC Explains How to Manage Your Outsourcing Risks

  • spacer
    Article

    Incident Response: Next-Gen Skills

    Evolving Threats Call for Evolving Proficiencies

  • spacer
    Interview

    BITS on Top Fraud Threats to Banks

    New Fraud Prevention VP on Latest Trends, Strategies

  • spacer
    Blog

    HIPAA Omnibus: Vendor Contracts

    Pay Attention to Those Business Associate Agreements

  • spacer
    Whitepaper

    Improving Risk Management Strategies using Identity Attributes

  • spacer
    Article

    Celebrity Breach Leads Roundup

    Information Posted on Public Website

  • spacer
    Article

    Rural Providers Get HIE Help

    Toolkit Addresses Privacy, Security Issues

  • spacer
    Interview

    Comparing Medical Devices on Security

    New Tool Will Help With Assessments

  • spacer
    Article

    Cyber Commander Addresses DDoS

    Says It's Not Government's Role to Defend Banks

  • spacer
    Article

    Keeping Data Queries, Responses Secure

    Tiger Team Examines Health Data Exchange Issues

prev next