From Advanced Threats

Mobile Tokens Are More Effective with a Fortified Device

Share Button

Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords. Read more

DMARC compliance

United Kingdom’s Decision to Mandate DMARC Compliance: Good for the Government, Great for the Public

Share Button

According to an article that ran in The Guardian, in 2012 United Kingdom topped the global list of nationstargeted by phishing Read more

New FFIEC Guidance

New FFIEC Guidance: Financial Institutions Must Look Closer at Mobile Banking Security

Share Button

If they haven’t already done so—or haven’t done so in a while– financial institutions in the United States will need to take a fresh look Read more

blogs

Could Anything Have Prevented SWIFT Attacks Against Banks?

Share Button

Just over two months after sophisticated cybercriminals used the SWIFT system to steal $81 million from a bank in New York, another such attack has come to light, Read more

Phone fraud scams

1-900-FRAUD: When Fraudsters Come Calling

Share Button

Hackers. Fraudsters. Shysters. No matter what name society has given them they’ve been around since time immemorial, banking on the fact (pun intended) that there’s a sucker born every minute.And while each of us likes to think that Read more

AdWords phishing schemes

When AdWords Attack: Another Method of Phishing

Share Button

Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google Read more

Behavioral anomaly detection

Thieves Steal $13M in 2 Hours Using Fake Credit Cards – How Can Banks Protect Themselves?

Share Button

News broke recently that thieves stole about $13M in cash from the South African Standard Bank Group Read more

Clustering of Phishing Attacks

Share Button

Easy Solutions data scientists, including the author of this article, will present extensive research on phishing patterns and correlations between attacks. Read more

Millions of Usernames, Passwords Compromised in Massive Email Data Breach

Share Button

It may be a good idea to change your password if you have an email account with one of the Big 3 email providers. Read more

What Makes a Financial Institution’s Brand and Anti-Phishing Strategy Effective?

Share Button

Secure web gateways and awareness training may protect a bank’s employees against phishing attacks, Read more