Companies House has been forced to protect companies from being stolen in their entirety

Moore, Simon
May 2005
Lawyer;5/9/2005, Vol. 19 Issue 18, p10
Trade Publication
Comments on the corporate identity theft and fraud committed by Pavel Makarov in the case "West Anglian Group Ltd. v. Makarov" in Great Britain. Makarov's impersonation of the directors of West Anglian; Issuance of a certificate of good standing by the British Companies House to Makarov; Efforts by the Companies House to prevent fraud, including authentication and computer security strategies.


Related Articles

  • Identity Theft: It Can Happen to You. Diller-Haas, Amy // CPA Journal;Apr2004, Vol. 74 Issue 4, p42 

    Provides information on the incidence and management of identity theft. Increase in the number of identity theft complaints in the U.S. in 2003; Steps in preventing identity theft; Additional precautions when using computers.

  • Has Someone Made Off With My Online Identity? Spector, Lincoln; Freed, Rebecca; O'Reilly, Dennis // PCWorld;Feb2005, Vol. 23 Issue 2, p132 

    This section addresses a query regarding online identity theft. If a user can't access a Web site with their password, they should try the simple solution first: Make sure that their Caps Lock key isn't active. Most security-minded sites use case-sensitive passwords; if their Caps Lock is on,...

  • Two-factor authentication access control will not prevent fraud and identity theft.  // SC Magazine: For IT Security Professionals (UK Edition);May2005, p15 

    This article presents differing views on the ability of the two-factor authentication process to prevent fraud and identity theft. Some say that two-factor authentication is an ineffective against identity theft. For example, issuing tokens to online banking customers will not reduce fraud,...

  • Email Authentication.  // Network Dictionary;2007, p175 

    A definition of the term "Email Authentication" is presented. It refers to ensuring a valid identity on an email to prove and protect the identity of the email sender. Email authentication helps prevent spam, forgery, fraud and more serious crimes. The DomainKey is used to ensure the entity has...

  • Privacy Concerns and Offshore Outsourcing Security. Changchit, Chuleeporn // Journal of Information Privacy & Security;2011, Vol. 7 Issue 2, p1 

    The article discusses various papers published within the issue including one on a countermeasure for keylogging attacks, another on usable authentication, and another one on the effect of information politics on the effectiveness of Health Information Exchange Networks.

  • Spear Phishing. Larkin, Erik // PCWorld;Nov2005, Vol. 23 Issue 11, p97 

    This article presents information on spear phishing. According to Peter Cassidy, secretary general of the Anti-Phishing Working Group, spear phishers act much like marketers, drafting a message and then directing it to just the right people. He said that these phish attacks make better use of...

  • E-COMMERCE: BOOM OR BUST? Nicolle, Lindsay // Computer Weekly;1/25/2005, p18 

    This article reports that dotcom trading is enjoying a boom, but its future depends on maintaining consumer trust. Lindsay Nicolle reports on the threats to confidence in online security. Online internet identity theft could be the next major high-tech crime wave to hit Great Britain, and the...

  • Is Any Account Safe? Yager, Tom // InfoWorld;8/29/2005, Vol. 27 Issue 35, p20 

    Relates an experience in being a victim of a fraudulent credit card transaction. Information on how the thief took his card number; Explanation on the Address Verification Service process of American Express; View on security on credit card authentication.

  • Stopping identity theft.  // Consumer Reports Money Adviser;Feb2008, Vol. 5 Issue 2, p2 

    The article offers tips on how to stop identity theft of consumers. Financial statements should always be checked promptly. It also advises to refrain from giving Social Security numbers and other potential identifiers when not required in a transaction. The importance of having a firewall on a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics