- Home
- ID Theft
ID Theft
The Latest News
-
Interview
How Phishing Attacks Are Evolving
Poor Internet Hygiene Enables Criminal Activity By Tracy KittenPhishing attacks are up, and the methods are changing. Paul Ferguson of the Anti-Phishing Working Group explains how phishers are fine-tuning their schemes and exploiting cross-platform technologies.
-
Article
BofA Confirms Third-Party Breach
Bank Spokesman: Customer Data is Secure By Tracy KittenBank of America confirms hacktivists' reports about a breach of a third-party service provider working with the bank to analyze public data. How did the breach occur, and what information was exposed?
-
Interview
Report: 28% of Breaches Lead to Fraud
New ID Fraud Report Studies Consumer Impact of Breaches By Tracy KittenNew research says more than 25 percent of consumers hit by a data breach later become victims of identity fraud - especially when payment card information is exposed. Javelin's Al Pascual shares analysis.
-
Article
Defending Against 'Blitzkrieg' Trojan
Researcher Reviews New Findings About Gozi-Prinimalka By Jeffrey RomanThe Gozi Trojan variant known as Prinimalka is expected to target 30 banking institutions in spring 2013. Now McAfee researcher Ryan Sherstobitoff says new research sheds light on how to prepare.
-
Article
Preventing Insider Medical ID Theft
Recent Cases Spotlight Fraud Risks By Marianne Kolbasuk McGeeThree recent identity theft incidents highlight the need for healthcare organizations to stay vigilant in preventing fraud involving insiders. Security experts offer advice.
White Papers
-
How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals
Learn how to prevent spear phishing - the latest and most dangerous technique in the cybercriminal's arsenal - from infiltrating your networks and compromising your customer data, intellectual...
-
Reaping the "Trust Dividend" - Federal Agencies Can Move Services Online Now with an Identity Button (Like Facebook) - and Save Billions
The move of paper-based transactional services online doesn't create just cost savings and efficiencies. E-Gov creates a "Trust Dividend," thanks to the use of trustable online identities - issued by...
-
The Three Pillars of Trust: Adopting a New Service Architecture for Trusted Transactions with Government on the Internet
All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have...
Webinars
-
Security Readiness: How to Combat Healthcare IT Security Threats
Since August of 2009, 552 large-scale breaches of PHI have been reported to HHS, impacting nearly 22 million people. OCR recently reported (somewhat to their surprise) that over two-thirds of the...
-
Misplaced Trust in the Mobile Platform
Metaforic will host a mobile security webinar with an additional speaker from Forrester. The one-hour session will provide an overview of the latest mobile threats, and will discuss in detail the...
While some healthcare organizations are quickly rolling out privacy and security policies for...
Latest Tweets and Mentions
While some healthcare organizations are quickly rolling out privacy and security policies for...
The ISMG Network
-
Webinar
Vendor Management Part I: FDIC Explains How to Manage Your Outsourcing Risks
-
Article
Incident Response: Next-Gen Skills
Evolving Threats Call for Evolving Proficiencies
-
Interview
BITS on Top Fraud Threats to Banks
New Fraud Prevention VP on Latest Trends, Strategies
-
Blog
HIPAA Omnibus: Vendor Contracts
Pay Attention to Those Business Associate Agreements
-
Whitepaper
Improving Risk Management Strategies using Identity Attributes
-
Article
Celebrity Breach Leads Roundup
Information Posted on Public Website
-
Article
Rural Providers Get HIE Help
Toolkit Addresses Privacy, Security Issues
-
Interview
Comparing Medical Devices on Security
New Tool Will Help With Assessments
-
Article
Cyber Commander Addresses DDoS
Says It's Not Government's Role to Defend Banks
-
Article
Keeping Data Queries, Responses Secure
Tiger Team Examines Health Data Exchange Issues