fraud alert

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: Symantec.cloud     Published Date: Oct 11, 2012
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years .
Tags : 
symantec, phishing, malware, security, internet security
    
Symantec.cloud
Published By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems are not keeping pace. Whatever tools and processes are in place now, theres always the opportunity to evolve to a higher level for more accurate detection more high-value alerts and fewer false positives.
Tags : 
    
SAS
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority, international computing
    
VeriSign Incorp.
Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS
Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, well highlight the current trends in todays phishing schemes, with a particular focus on the latest threats emerging from China. Then well offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
    
Thawte
Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.