The performance of the mobile phone is more and more strong, more and more rich, many things can be compared with the current PC, which is caused by the current mobile phone Trojans, phishing sites and more virus, so many people are in the ...
Tags: mobile phone, anti-virus software, mobile phone system
Vehicle technology provider Tech Mahindra has secured a contract from the New Hampshire's Division of Motor Vehicles (DMV) to deploy the Motor Vehicle Enterprise System (MOVES) on the local vehicles for 22 months. MOVES is a configurable ...
Tags: Vehicle, Motor Vehicles
Federal efforts to combat health care fraud recovered a record $4.3 billion in fiscal 2013 and have recouped more than $8 for every $1 spent on enforcement over the past three years, according to an annual report released Wednesday. ...
Tags: Health Care, Fraud, Recovered
There are many new stores in Taobao.com every day,most of them do the stationery business.Lepusheng stationery (www.lepusheng.com)analysis that,there are many kinds of online shore.The newcomer should attract the young buyer througt some ...
Tags: stationery, supply, online, shop
The ability to predict the future has long been the stuff of science fiction or, more often, pure fantasy, with hard science usually finding it difficult to rationalise there ever being a way to use technology to foretell what is to come. ...
Tags: IBM, Computer Products, software
Iovation, stopping Internet fraud and identifying good online customers with the world's most comprehensive device reputation database, announced that its flagship fraud-fighting service, ReputationManager 360, has won The Retail Fraud ...
Tags: Iovation, Retail Fraud Prevention
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...
Prison sentences for hacking and cyber crime are set to rise across Europe if a new draft directive becomes law, as the EU looks to combat cyber espionage and cyber attacks against critical national infrastructure. A draft directive set ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
With the previously $40,000 Carberp Trojan's source code now freely available, experts expect exceptionally destructive variants of the malware to flow onto the Internet. Carberp-based malware is expected to take advantage of the bootkit ...
Tags: Computer Products, software
According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
A report by Gartner predicts that the number of sophisticated attacks on e-commerce and financial industries will increase in 2013. According to Gartner, during these incidents attackers will send out targeted commands to the memory of ...
Tags: e-commerce industrie, financial industrie, applications
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, a number of security experts now say that there is not enough evidence to assign the blame ...
Tags: Iran, bank attacks, financial services networks, cyber security
Despite the introduction of "chip-and-pin" security, payment card fraud across the European Union cost some €1.5bn (£1.2bn) in 2012, according to the latest figures from Europol. While chip-and-pin has helped to reduce card ...
Tags: payment card fraud, chip and pin, finance security, card fraud