86 results on '"Identity theft -- Analysis"'
Search Results
2. Email of the technical secretary of the National Anticorruption System suffers hacking attempt
3. Identity Fraud Flourishes Amid Consumers' Growing Digital Presence, Costing Them Time and Money
4. Govt. Response to CoWIN Data Leak Raises Concerns Over Digital Security
5. Regula Share Identity Verification Trends to Shape 2024 and Beyond
6. New Research Reveals 307% Increase in ATO and ID Fraud Due to Generative AI and Deepfakes
7. Lowering the Bar(d)? Check Point Research's security analysis spurs concerns over Google Bard's limitations
8. Julie Elliott ask the Secretary of State for the Home Department, whether she has made an assessment of the level of threat to people over the age of 65 of being targeted by online (a) data phishing and (b) other scam attacks
9. Identity Threat Assessment and Prediction
10. Identity Theft Resource Center Q1 2023 Data Breach Analysis: Lack of Actionable Information in Notices Continues to Grow
11. Microsoft Previews Authentication Strength Feature for Greater Control over Multifactor Authentication Access Methods
12. New Computer Science Research from Cybersecurity Laboratory Described (Unbalanced Web Phishing Classification through Deep Reinforcement Learning)
13. University of Defence Researcher Adds New Study Findings to Research in Computers (How to Understand Phishing)
14. Research from Birla Institute of Technology and Science Pilani in the Area of Algorithms Described (Hybrid Approach for Phishing Website Detection Using Classification Algorithms)
15. The Identity Theft Resource Center to Release Business Impact Report & Q3 Breach Analysis for Cybersecurity Awareness Month 2022
16. KnowBe4 Revolutionizes Security Culture Measurement With Industry-First Maturity Model
17. Microsoft releases analysis of Web3 'ice phishing' attack
18. STEAL OF A DEAL; Too good to be true? ID theft case shows dealers what to watch for
19. It won't happen to me: Promoting secure behaviour among internet users
20. Fake driving licences the main source of digital wallet fraud attempts
21. SlashNext Enhances Listing on Palo Alto Networks Cortex XSOAR Marketplace
22. SlashNext Enhances Listing on Palo Alto Networks Cortex XSOAR Marketplace
23. Increase in cyberattacks in Kingdom turns spotlight on digital forensics
24. Peru : ASBANC and MIGRACIONES strengthen cooperation to combat crimes in the financial system
25. Identity theft: An exploratory study with implications for marketers
26. Cyber safety starts upfront: increased reliance on electronic records heightens focus on data security
27. Evidence Of Harm Required To Advance Class Action Following Data Breach
28. GBG intelligence center combines biometrics with data analysis to help financials fight ID fraud
29. Studies from National Engineering College Add New Findings in the Area of Machine Learning (Intelligent Antiphishing Framework To Detect Phishing Scam: a Hybrid Classification Approach)
30. Consumers, people, and Kim
31. Researchers at University of Ilorin Publish New Data on Science and Technology (Improving the phishing website detection using empirical analysis of Function Tree and its variants)
32. Federal Reserve System White Paper Examines Mitigation of Synthetic Identity Payments Fraud
33. Remote Work, Data Breaches And Cybersecurity Considerations During COVID-19
34. Remote Work, Data Breaches And Cybersecurity Considerations During COVID-19
35. ID THEFT RULING OPENS THE DOOR TO COLLABORATIVE ENFORCEMENT ... IF THE FEDS SEIZE THE INITIATIVE
36. Address And Web Domain Analysis In The Fight Against Phishing
37. Most Effective Phishing Tactics Revealed by Bob's Business Analysis
38. New risks, new coverages: insurers are creating new products to cover commercial entities' increased liability for identity theft
39. Address And Web Domain Analysis In The Fight Against Phishing
40. Lifelock to pay $100m to settle FTC charges
41. Identity theft: laws, crimes, and victims
42. Microsoft to Improve Office 365 Malicious Email Analysis
43. LinkedIn Accounts for More than Half of Social Media Phishing Emails in Q2 2019, According to KnowBe4 Findings
44. Featurespace Introduces Adaptive Behavioral Biometrics to Solve Complex Fraud Attacks in Digital Channels
45. Sextortion an Emerging Cyber Threat for Business and Employees: Barracuda Study
46. Here to Help; How to Spot a Phishing Attempt
47. Gift-Card Phishing Scheme Targets Professors' Zeal to Please the Dean
48. Health care 2017: major issues loom regardless of ACA fate
49. Agencies require risk assessments of authentication methods
50. The securitization of financial identity and the expansion of the consumer credit industry
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.