From Advanced Threats

Protecting against Remote Access Trojans

RAT: Detecting and Fighting Modern-Day Voyeurism

Share Button

A picture featuring Facebook founder Mark Zuckerberg appears to show tape covering the camera lens on his laptop. The move was presumably taken as a precaution against RAT, which stands for Remote Access Trojans. Read more

Marcher Android Malware

Marcher Android Malware –Same Tune, Different Lyrics

Share Button

Recently, security researchers have been warning consumers about Marcher, an early Trojan for Android targeting banks.The Trojan first appeared to be affecting banking applications in Argentina, Colombia, Mexico, Peru, Chile and Brazil, but has now expanded to the United Read more

DKIM

Leveraging the Power of Email Authentication – Part 1: What is DMARC?

Share Button

This article is Part 1 of our “Leveraging the Power of Email Authentication” series. Read Part 2: Using DKIM to Enable DMARC and Part 3: Implementing DKIM.

A business can ensure its email is accurately delivered to inboxes around the world and reject the delivery of phishing. Read more

EMV adoption

Effects of EMV Adoption: Have We Seen any Changes in Criminal Patterns?

Share Button

The much ballyhooed arrival of EMV (Chip and PIN) credit cards is now well under way, and most, if not all, major U.S. banks have already swapped out their customers’ old credit cards for those with EMV chips. As background, the Read more

Fraud Data Scientist

Applying Data Science to Fraud Prevention

Share Button

Eighty thousand Kindle users. Sixty-five million Tumblr users. What do they have in common? Both groups had their login credentials breached, courtesy of hackers. While these attacks didn’t directly target financial Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more

biometrics

Biometrics a Convenient Addition, But No Silver Bullet

Share Button

We often say no product or solution is a “silver bullet” for fraud. In order to fend against the rich mosaic of cyberattacks threatening organizations, multi-factor Read more

Scammers Evolving: Top 5 Most Sophisticated Olympic Scams We’ve Seen So Far

Share Button

There’s a sucker born every minute. And for each sucker there are hundreds of scammers waiting to take advantage of them.Now, with the Olympic Games Read more

New Attack Channels on the Rise – How Search Engine Ads, Social Media and Apps Are Used to Perpetrate Fraud

Share Button

It’s much easier for fraudsters to trick victims into divulging sensitive information than it is to hack usernames and passwords. Read more

phishing

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

Share Button

A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more