Overview of the latest stats from the FTC's Consumer Sentinel Network Data Book.
Article on third-party debt collection services fraud and ways to prevent it.
The mobility of laptops led to an exploitation of personal data through loss and theft, but the movement to smaller portable devices represents a much larger opportunity for cyber criminals to exploit data. This article describes how they do it.
View the Issue
"When new people come in because there's change, it's sometimes harder to spot anomalous behaviors,” said WIRED Editor-in-Chief Nicholas Thompson at the 31st Annual ACFE Global Fraud Conference. “Of course spotting anomalous behaviors is how a lot
of fraud detection works. You know the patterns of what we do, you look for things that don't quite fit those patterns and you identify that as fraud."
View the video.