{"id":145,"date":"2017-01-16T03:50:37","date_gmt":"2017-01-16T03:50:37","guid":{"rendered":"https:\/\/blogs.scu.edu\/finis\/?p=145"},"modified":"2017-01-16T03:50:37","modified_gmt":"2017-01-16T03:50:37","slug":"the-always-changing-real-estate-system-fraud","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/finis\/2017\/01\/16\/the-always-changing-real-estate-system-fraud\/","title":{"rendered":"The Always Changing Real Estate System Fraud"},"content":{"rendered":"<p>Hackers are constantly coming up with new ways to commit fraud as it relates to real estate agents and their clients.\u00a0The issue of securing who can access a transaction management system is becoming more important. Hackers use phishing emails to gain login credentials to such systems and identify target transactions along with client information. This allows\u00a0the offenders to request wire transfers at the appropriate time to an account that the hacker can access. This security issue is not surprising given the fact that so many transactions take place online. In addition, communication\u00a0commonly takes place through email or unsecure messaging further allowing hackers to gain private login information. Therefore, partial responsibility falls on the information system login to provide necessary security to prevent such fraudulent behavior from occurring. Segregation of duties and restricted access can be two methods to further provide security to a transaction management system like the ones hackers are exploiting.<\/p>\n<p>&nbsp;<\/p>\n<p>Citation:\u00a0&#8220;The Latest Evolution of Real Estate Wire Fraud.&#8221; <i>RISMedia<\/i>. N.p., 13 Jan. 2017. Web. 15 Jan. 2017<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are constantly coming up with new ways to commit fraud as it relates to real estate agents and their clients.\u00a0The issue of securing who can access a transaction management system is becoming more important. Hackers use phishing emails to gain login credentials to such systems and identify target transactions along with client information. This &hellip; <a href=\"https:\/\/blogs.scu.edu\/finis\/2017\/01\/16\/the-always-changing-real-estate-system-fraud\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Always Changing Real Estate System Fraud<\/span><\/a><\/p>\n","protected":false},"author":1798,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-145","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":0,"qubely_featured_image_url":null,"qubely_author":{"display_name":"tmacdonald","author_link":"https:\/\/blogs.scu.edu\/finis\/author\/tmacdonald\/"},"qubely_comment":0,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/finis\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"Hackers are constantly coming up with new ways to commit fraud as it relates to real estate agents and their clients.\u00a0The issue of securing who can access a transaction management system is becoming more important. Hackers use phishing emails to gain login credentials to such systems and identify target transactions along with client information. This&hellip;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/users\/1798"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":1,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/145\/revisions"}],"predecessor-version":[{"id":147,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/145\/revisions\/147"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/media?parent=145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/categories?post=145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/tags?post=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}