Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
The leak of 75,000 internal military logs on the Afghanistan war is a major IT security breach, but the fact that the breach - or leak - of such magnitude occurred didn't seem to surprise many. And, two recent reports show why.