Monday, April 20, 2009

Device fingerprinting defends against online fraud

Online fraud is on the rise increasing the adoption of a new security discipline called device fingerprinting
Network World logo

IT Best Practices Alert

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Spotlight Story
Device fingerprinting defends against online fraud

Linda Musthaler By Linda Musthaler
Cybercriminals have established vast botnets comprised of millions of computers that are controlled by malicious masters. These bots allow the fraudsters to purchase goods, apply for credit cards, access bank accounts and more - all from the relative obscurity of a compromised device. A new security discipline called device fingerprinting is making it harder for criminals to conduct their illicit business from a device they have overtaken. Learn more about how you can validate if your transactions are coming from a legitimate device or one that has been compromised for criminal purposes. Read full story

Linda Musthaler is a principal analyst with Essential Solutions Corporation.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Device Fingerprinting Aims To Stop Online Fraud It has been said that on the Internet no one knows you are a dog, but if you are a financial institution, or even a dating service, authentication is very serious business. User names and passwords are no longer secure ...

Entrust to be acquired by private equity firm for $114 million Entrust today announced it has entered into a deal to be acquired by private equity investment firm Thoma Bravo for $114 million.

Conficker Awakens, Starts Scamming The Conficker worm is back in action and stumping security experts once again. One of the most craftily designed pieces of malware recently got an update and is finally starting to behave like other worms.

Symantec offers online fraud protection Symantec announced the availability of Symantec Online Fraud Protection, a comprehensive program that includes Symantec services, education and ongoing monitoring and management capabilities designed to protect ...

Three years undercover with the identity thieves Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.

PayPal buys Fraud Sciences for $169M EBay's online payments division, PayPal, will pay $169 million for an Israeli security company specializing in detecting online fraud, the companies said Monday. The deal should close within 30 days.

White collar crimes burnt by extreme fingerprinting Corporate crime scenes could be cleaned up in minutes, not hours, thanks to locally developed technology that uses extreme heat to reveal fingerprints.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/20/09

Today's most-read stories:

  1. Microsoft discloses ambitious security strategy
  2. Cisco reveals aggressive pricing for blade server system
  3. PBX killer, Voice CAL coming to OCS in 2010
  4. Black Hat 'supertalk' halted due to vendor concerns
  5. Why is Google's Schmidt still on Apple's board?
  6. Forced week off at Adobe not exactly a vacation
  7. Cisco against Buy America provisions of broadband stimulus fund
  8. Breakthrough enables Terabit Ethernet
  9. Microsoft's cloud identity platform on track
  10. H1-B demand falls sharply
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news




IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment