From Advanced Threats

WannaCry Remedy

WannaCry Remedies: The Second Wave of Attacks

Share Button

Since last Friday, over 200,000 victims in 150 countries have been hit by a massive, international ransomware cyberattack called WannaCry. Read more

Banking Malware

Fighting Back Against BankBot

Share Button

BankBot, a very simple and spiteful Trojan, has been targeting Android devices since 2016. Now it’s back, and it’s stronger than ever. This particular Trojan is well-known thanks to its Read more

digital threats

Improved Dashboard Makes Monitoring Digital Threats Easier

Share Button

Easy Solutions recently updated its customer portal with the goal of improving user experience and better tracking the effectiveness of our Digital Threat Protection solutions. Read more

Digital Threats

Latest IRS Scam Shows Need for Proactive Defense Against Digital Threats

Share Button

A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals. Read more

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

Vicious malware

Trojan Attack Targets Major Banks in Chile

Share Button

A vicious malware attack spread to nine of the biggest banks in Chile last month. At least 854 machines were impacted by this attack. The first attack’s transmission began with an Read more

Holiday scams

Time for Corporations to Stay Alert: The Great Holiday Scam Is Back

Share Button

Online shopping sales alone this holiday season are expected to hit $117 billion and that spells big profits for retailers and big opportunity for those who aren’t concerned with receiving a lump of coal in their stocking. Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

TeamViewer

TeamViewer’s Libraries Part of Complex Malware Process

Share Button

Fraudsters are getting ever more creative. Every app and device is now an avenue for new threats seeking to capture the personal information of end users.

Not long ago, we wrote about Remote Access Threats (RAT), which aim to access users’ cameras and microphones. Read more

swordphish

An Answer to the Failing Blacklist System

Share Button

This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention. Read the first and second installments.

The most common way to mitigate phishing attacks is by warning end users that they have navigated to a phishing website, for which the browser must Read more