RSS feed Get our RSS feed

News by Topic

fraudulent

Results 1 - 25 of 30Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
     Akamai Technologies Australia
By: WNS     Published Date: Apr 06, 2017
In the recent past, a New York City court convicted 13 people including six medical professionals who had, over several years, milked auto insurance companies of millions in fraudulent claims.
Tags : insurance, auto insurance, wns, benefits of wns
     WNS
By: IBM Watson Health     Published Date: Dec 12, 2018
Data analytic solutions help improve the value of health and human services, drive better decision-making and lower costs. See how the right solutions can contribute to millions of dollars saved through fraudulent claims detection, offer insights into the social determinants of health and benefit social programs.
Tags : government, health and human services, artificial intelligence, data, cognitive insights, medicaid, fraud reduction, social program management
     IBM Watson Health
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : credential, bots, business, risk, management, security, cyberattacks
     Akamai Technologies Australia
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: UL     Published Date: Sep 12, 2018
Performance textiles and fabrics are rapidly bringing apparel and footwear products into the 21st century. Manufacturers today are innovating at breakneck speed and bringing to the market synthetic textiles and fabrics with enhanced performance characteristics, or that feature embedded fibers or topical applications. This has led to the widespread introduction of advanced performance apparel and footwear that offer you new levels of comfort and safety. At the same time, sorting through claims regarding the performance characteristics of these advanced textiles and fabrics can present real challenges for manufacturers, retailers and you. At a minimum, the myriad of vague, conflicting or unsubstantiated marketing claims and characterizations used to promote these materials often result in frustration and disappointment. And fraudulent representations can unnecessarily expose apparel manufacturers and retail buyers to potentially hazardous chemicals and other risks.
Tags : 
     UL
By: CA Technologies     Published Date: Feb 08, 2018
CNP fraud is showing no signs of deceleration and is, in fact, expanding rapidly. New trends and new threats call for a revolutionary approach to effectively stop fraud. Learn how to deploy solutions that can quickly distinguish between genuine and fraudulent transactions and take appropriate action instantly. Explore the CA Risk Analytics Network.
Tags : 
     CA Technologies
By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : security. ibm, ibm i2, cyber-intelligence, fraud, malware
     IBM
By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting
     Fiserv
By: IBM     Published Date: Apr 26, 2016
New channels and cashless payment ecosystems have created greater risk for financial institutions; the increase in fraudulent activities has compounded the need for more rapid detection and counter measures. Please view this webcast and learn: - The key challenges financial institutions face in rapidly detecting, responding and countering new fraud schemes - The value a cognitive computing approach offers an institution; enabling them to make swifter, more accurate decisions while providing more control and transparency
Tags : ibm, ibm banking industries, risk management, predictive analytics, fraud, cognitive computing
     IBM
By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence, security
     IBM
By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : cyber security, intelligence, prevention, ibm, data protection
     IBM
By: IBM     Published Date: Jan 26, 2017
The IBM Counter-Fraud Management for Insurance solution is designed to help insurers prevent and intercept attempted fraud while detecting, identifying, and building the case against past fraudulent activity and improper payments.
Tags : ibm, analytics, insurance, counter-fraud management, fraud
     IBM
By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
     Proofpoint
By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
     uberVU via HootSuite
By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
     FICO
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
     ArcSight
By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : social, engineering, fraud, cyber, security, scams
     FICO
By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
     LifeLock
By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : malware, global threats, 2007, threats, email, threat summary, threat report, viruses
     ESET
By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : data, mining, detect, insurance, fraud, insurers, fraudulent, claims
     IBM
By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers
     ThreatMetrix
By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers
     ThreatMetrix.
By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security
     IBM
By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
     Iovation
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics