sponsored by ComputerWeekly.com
Posted:  11 Nov 2013
Published:  11 Nov 2013
Format:  PDF
Length:  28  Page(s)
Type:  Essential Guide
Language:  English

White-collar crime – present and future


Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection. According to the latest report from KPMG, organisations are set to battle against so-called “seeker bots” - defined as self-learning and self-replicating Artificial Intelligence that will render the faces of criminals invisible.


KPMG’s ‘Profile of a Fraudster’ report is based on analysis of 596 fraudsters investigated by the firm between 2011 and 2013. Based on the modus operandi of their crimes, it predicts that traditional fraudsters (identified by KPMG as 36 – 45 years of age, acting against is/her own organisation and in an executive positions), will be replaced by “seeker bots”.


The report warns that, on finding a gap, the bots will analyse the potential for fraud and then launch a highly specialised “attack bot”, uniquely designed to suit the type of business, size, infrastructure and data setup of the victim. The aim will be to remove assets to a virtual delivery location which can then be accessed by the fraudsters.


Click on the button below to download this report


Compliance (Finance) | Compliance Software | Criminal Law | Cybersecurity | Cyberterrorism | Fraud Protection | Hackers | Malware | Regulations | Regulatory Compliance | Security | Security Best Practices | Security Infrastructure | Security Management | Security Policies | Security Threats | Virus Protection

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement