Topics

Filter By:

Topic

Results: (214)

Counterfeit guitars flood global markets

The rising demand for musical instruments like guitars means more opportunities for fraudsters to take advantage of lax trademark laws and sell modified fake instruments to unsuspecting victims. The author, a guitar enthusiast himself, breaks down the elements of this fraud scheme and provides ways for music lovers and fraud examiners alike to avoid common scams and fight counterfeit fraud.

Written By: Donn LeVie, Jr., CFE

    • Consumer Fraud and Scams
    • Fraud Prevention and Deterrence
    • Fraud Schemes

Watch out for scams involving discount utility services, million-dollar prizes and unemployment benefits

The latest identity theft schemes involve convincing victims to pay with gift cards to receive steep discounts on utility services, paying to claim a million-dollar prize and using stolen identities to file unemployment claims.

Written By: Robert E. Holtfreter, Ph.D., CFE

    • Fraud Prevention and Deterrence
    • Fraud Schemes
    • Identity Theft

We must be ‘Battle Buddies’ for military veteran victims of fraudulent abuse

On battlefields, soldiers have traditionally teamed up with ‘Battle Buddies’ so that no one is left behind. The authors encourage anti-fraud practitioners to help prevent and detect elder fraud, especially among military vets — a particularly vulnerable population.

Written By: Michele P. Bratina, Ph.D., John Schwartz, Kate Kleinert

    • Consumer Fraud and Scams
    • Financial Transactions and Fraud Schemes
    • Fraud Schemes

Carousel fraud

The not-so-merry evasion of value-added taxes is a vicious cycle of false trading across multiple countries. Around these trader schemes, known as carousel fraud, fraud examiners work to uncover complex international fraud networks and identify at-risk business entities.

Written By: Samuel May, CFE

    • Anti-Fraud Laws Regulations and Compliance
    • Fraud Schemes
    • Tax Fraud

Deception by inundation: How fraudsters play the system in personal injury cases

Tricking insurance and other companies into paying for fake injuries is a perennial, and often complicated, scam. Here the authors examine the three principal players typically involved in these schemes and how evidence of an injury isn’t always what it seems, especially when fraudsters deliberately throw everything but the “kitchen sink” at payers.

Written By: Dennis DiGiorgi, DC, CFE, CHCQM, Jason Tenenbaum, Esq.

    • Fraud Schemes
    • Health Care Fraud
    • Insurance Fraud

The evolution of PAN enumeration attacks: Tackling a growing threat to payment security

By exploiting automated processes, fraudsters can bypass payment security measures at a faster, subtler rate. The authors explain how payment-processing companies can increase their defenses and better protect their customers against this growing threat to their security.

Written By: Dustin J. Eaton, CFE, Marcus Vinson

    • Cyberfraud
    • Fraud Prevention and Deterrence
    • Fraud Schemes

The dark side of giving: Exposing charity fraud

From employees who embezzle funds to criminals who exploit disasters for profit, charitable organizations are vulnerable to many types of fraud schemes. The author reveals the methods perpetrators use to deceive donors and charities, and how organizations can protect themselves to carry out their philanthropic missions. 

Written By: Rasha Kassem, Ph.D., CFE

    • Fraud Prevention and Deterrence
    • Fraud Schemes
    • Nonprofit Fraud

Under pressure

Generations that grew up with the internet aren’t immune to online fraud schemes. Trust in online platforms, heavy involvement in social media and financial pressures facing Gen Z and millennials put them at greater risk of being victimized by fraudsters than older adults. Fraud Magazine explores how younger generations become victims — and perpetrators — and what fraud examiners can do to educate them about fraud.

Written By: Crystal Zuzek, Anna Brahce

    • Consumer Fraud and Scams
    • Cyberfraud
    • Fraud Schemes

Infiltrating the IT industry

Companies across the globe have unknowingly hired remote information technology workers acting on behalf of the Democratic People’s Republic of Korea (DPRK). Using stolen identities and gaining access to sensitive data, the workers illicitly generate revenue for the DPRK’s Weapons of Mass Destruction (WMD) and ballistic missiles programs (weapons program). The author breaks down elements of the scheme and provides tactics for organizations to avoid hiring bad actors.

Written By: Trisha Gangadeen, CFE

    • Computers and Technology
    • Fraud Prevention and Deterrence
    • Fraud Schemes

Nations unite to wipe out telecom fraud centers and more

China, Myanmar and Thailand join forces to tackle telecom fraud centers operating in Myanmar; a woman in Texas pleads guilty to smuggling and distributing an unapproved, altered drug used to treat cats; the prison sentence of former Mozambique finance minister, Manuel Chang, is increased; and former U.S. Senator Bob Menendez is sentenced to 11 years in prison.

Written By: Crystal Zuzek

    • Bribery and Corruption
    • Cyberfraud
    • Fraud Schemes

Begin Your Free 30-Day Trial

Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.