From Featured News

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

Vicious malware

Trojan Attack Targets Major Banks in Chile

Share Button

A vicious malware attack spread to nine of the biggest banks in Chile last month. At least 854 machines were impacted Read more

millenials-post2

Seven Most Popular Easy Solutions Blog Posts of 2016

Share Button

In 2016, we published more than 50 blog posts about authentication, fraud trends, data breaches, new attacks, fraud prevention best practices and more. Read more

Holiday scams

Time for Corporations to Stay Alert: The Great Holiday Scam Is Back

Share Button

Online shopping sales alone this holiday season are expected to hit $117 billion and that spells big profits for retailers and big opportunity for those who aren’t concerned with receiving a lump of coal in their stocking. Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

TeamViewer

TeamViewer’s Libraries Part of Complex Malware Process

Share Button

Fraudsters are getting ever more creative. Every app and device is now an avenue for new threats seeking to capture the personal information of end users.

Not long ago, we wrote about Remote Access Threats (RAT), which aim to access users’ cameras and microphones. Read more

Proactive fraud prevention

Fraud Prevention: Driving Innovation as Digital Transactions Grow Exponentially

Share Button

We’ve all heard the phrase “the best defense is a good offense.” The analogy proves as true on the football field as it does in the field of online fraud prevention. Too many instances exist where companies rush to implement Read more

Phishing

The Technical Side of Phishing and How to Prevent It

Share Button

This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention.

Phishing, by definition, is the act of defrauding an online user and tricking them into clicking on a malicious link Read more

Protecting against Remote Access Trojans

RAT: Detecting and Fighting Modern-Day Voyeurism

Share Button

A picture featuring Facebook founder Mark Zuckerberg appears to show tape covering the camera lens on his laptop. The move was presumably taken as a precaution against RAT, which stands for Remote Access Trojans. Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more