The food and drink industry is being urged to better protect itself from fraud in order to safeguard their businesses and consumers. The warning comes from the Chartered Institute of Environmental Health (CIEH) on the same day the ...
Tags: Fraud Good, CIEH
Fraudsters are trying to take advantage of the changing of the clocks to trick people into handing over sensitive info, like usernames, passwords, and even driving licence and passport numbers. Choosing to take advantage of the change in ...
Tags: SMS Scammers, Apple
The European Commission has introduced a dedicated IT tool called the Administrative Assistance and Cooperation (AAC) to keep a tab on possible cross-border food supply chain violations of administrative information between national ...
Only 27 percent of U.S. merchants will be EMV-ready by the October 1st liability shift, down from 34 percent estimated in March, according to a survey by the Strawhecker Group (TSG) released Thursday. By December 2015, 44 percent of ...
The Food Standards Agency (FSA) has today confirmed details of a new round of tests of beef products for horse meat contamination. The tests have been requested by the European Commission as part of the follow-up to last year's horse meat ...
Tags: FSA, certification, Agriculture, Food
Cutting-edge mobile phone technology is set to revolutionise the way people shop, bringing a range of new and complex challenges for retailers, according to new research by Dr Emmeline Taylor, senior lecturer in criminology with the ANU ...
While Germans can pay each other with Bitcoins, companies need permission from the authorities to use the virtual currency. The German Federal Ministry of Finance said on Monday that Bitcoin is not a full-fledged currency but that it is ...
Tags: Computer Products
A cottage industry is growing up around virtual padlocks that consumers can place on cloud services so that the vendors themselves can't get to the information -- even if the government requests access. And in recent years there have been ...
Tags: Cloud Data, Computer Products
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
The Dutch government has unveiled a new Bill that would empower its investigators to hack into PCs and servers, install spyware, read people's email and even destroy files - all in the name of fighting cybercrime. The proposed law, ...
Tags: Proposed Dutch, Computer Products
According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
U.S. consumers experienced the highest level of identity theft in three years in 2012, although much of the fraud losses were absorbed by banks and merchants, according to a new survey. Incidents of identity fraud affected 5.26 percent of ...
Tags: identity theft, US, identity victims
Banks and other financial institutions in the US have been told to establish a "risk management programme" for social media to ensure that key staff do not inadvertently release sensitive information. The programme would ensure that they ...
Despite the introduction of "chip-and-pin" security, payment card fraud across the European Union cost some €1.5bn (£1.2bn) in 2012, according to the latest figures from Europol. While chip-and-pin has helped to reduce card ...
Tags: payment card fraud, chip and pin, finance security, card fraud
Computerworld-U.S.officials today struck at six long-running scams,freezing assets of 14 companies charged with bilking consumers by posing as tech support from Microsoft,Symantec and others. In a press conference,the Federal Trade ...
Tags: U.S.officials, FTC, tech support