A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how
Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords.
United Kingdom’s Decision to Mandate DMARC Compliance: Good for the Government, Great for the Public
According to an article that ran in The Guardian, in 2012 United Kingdom topped the global list of nationstargeted by phishing
If they haven’t already done so—or haven’t done so in a while– financial institutions in the United States will need to take a fresh look
Just over two months after sophisticated cybercriminals used the SWIFT system to steal $81 millionfrom a bank in New York, another such attack has come to light,
Hackers. Fraudsters. Shysters. No matter what name society has given them they’ve been around since time immemorial, banking on the fact (pun intended) that there’s a sucker born every minute.And while each of us likes to think that
Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google
We’re proud to announce that we have been included among mobile fraud management solution vendors
News broke recently that thieves stole about $13M in cash from the South African Standard Bank Group
Easy Solutions data scientists, including the author of this article, will present extensive research on phishing patterns and correlations between attacks.