The dead can't speak for themselves. But they can apparently file U.S. tax returns. A new audit of the Internal Revenue Service (IRS) has found the agency paid refunds to criminals who filed false tax returns, in some cases on behalf of ...
Tags: IRS, U.S.tax returns, TIGTA, ID theft
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
The cost of protection against cyber crime can far exceed the cost of the threat itself, a Cambridge University-led international study has concluded. The first systematic study of the cost of cyber crime recommends that less should be ...
Tags: cyber crime, anti virus software, network, cyber safety
The feud between Autonomy founder Mike Lynch and Hewlett-Packard’s leadership over alleged accounting fraud at the software vendor has intensified, with Lynch declaring his innocence in an open letter to the company’s board and ...
Tags: Autonomy, HP, Meg Whitman, ike Lynch
Finding manufacturing partners, keeping it SIMPLE and SAFE How to protect my IP Rights? Register your intellectual property right(s) (IP rights) under your country's law. You can protect your Logo(s) and Slogan(s) under the Chinese Anti ...
Tags: Sourcing, China, Focus Vision
With so many publicly disclosed instances of online fraud and identify theft, why don't more people encrypt their email messages? That's the question the software developers at Encrytomatic LLC asked themselves recently while developing ...
Tags: online fraud, identify theft, email message, online service
EMC said today it has agreed to buy privately-held start-up Silver Tail Systems, a vendor of real-time web session intelligence and behavioural analysis. EMC plans to use the purchase to beef up its RSA security division in the rapidly ...
Tags: EMC, Silver Tail, web intelligence, Silver Tail Systems
At IBM’s Information On Demand and Business Analytics Forum, being held this week in Las Vegas, the company announced a number of new add-ons and services designed to help organisations analyse their expanding data sets more quickly. ...
Tags: analysis, business analytics, data, IBM, information
IBM has expanded its PureSystems line of pre-integrated systems to include new models to handle business analysis and online transaction processing. The PureData systems have been assembled to excel at three common tasks within enterprise ...
Tags: analytics, big data, business, IBM, PureSystems
A U.S. House intelligence committee report warning that two Chinese networking companies are posing security risks to the country also includes allegations of job bias and visa fraud at one of the firms, Huawei Technologies. The report, ...
Tags: U.S., security risks, Huawei, visa fraud
The operator of a mutual fund has pleaded guilty in U.S. court to charges that he operated a $13 million scheme to sell shares of Facebook and Groupon stock before their initial public offerings. John Mattera, who served as chairman of ...
Tags: mutual fund, operator, U.S.court, Facebook, Groupon stock
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
IDG News Service - Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said. A cybercriminal using the ...
Tags: Computer Products, Credible Threat, Mcafee, Blitzkrieg E Banking Heist
The Greater London Authority (GLA) has rolled out a cloud-based incident management tool to record and track non-compliance issues, security threats and fraud. The web-based Xactium Incident Manager application gives users real-time ...
Tags: cloud-based, incident management tool, non-compliance issues
HP is planning to "aggressively" seek recompense for alleged accounting fraud related to the acquisition of its Autonomy unit, which resulted in the vendor taking a non-cash impairment charge of US$8.8 billion. HP acquired Autonomy in ...