From Featured News

TeamViewer

TeamViewer’s Libraries Part of Complex Malware Process

Share Button

Fraudsters are getting ever more creative. Every app and device is now an avenue for new threats seeking to capture the personal information of end users.

Not long ago, we wrote about Remote Access Threats (RAT), which aim to access users’ cameras and microphones. Read more

Proactive fraud prevention

Fraud Prevention: Driving Innovation as Digital Transactions Grow Exponentially

Share Button

We’ve all heard the phrase “the best defense is a good offense.” The analogy proves as true on the football field as it does in the field of online fraud prevention. Too many instances exist where companies rush to implement Read more

Phishing

The Technical Side of Phishing and How to Prevent It

Share Button

This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention.

Phishing, by definition, is the act of defrauding an online user and tricking them into clicking on a malicious link Read more

Protecting against Remote Access Trojans

RAT: Detecting and Fighting Modern-Day Voyeurism

Share Button

A picture featuring Facebook founder Mark Zuckerberg appears to show tape covering the camera lens on his laptop. The move was presumably taken as a precaution against RAT, which stands for Remote Access Trojans. Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more

Marcher Android Malware

Marcher Android Malware –Same Tune, Different Lyrics

Share Button

Recently, security researchers have been warning consumers about Marcher, an early Trojan for Android targeting banks.The Trojan first appeared to be affecting banking applications in Argentina, Colombia, Mexico, Peru, Chile and Brazil, but has now expanded to the United Read more

DKIM

Leveraging the Power of Email Authentication – Part 1: What is DMARC?

Share Button

This article is Part 1 of our “Leveraging the Power of Email Authentication” series. Read Part 2: Using DKIM to Enable DMARC and Part 3: Implementing DKIM.

A business can ensure its email is accurately delivered to inboxes around the world and reject the delivery of phishing. Read more

EMV adoption

Effects of EMV Adoption: Have We Seen any Changes in Criminal Patterns?

Share Button

The much ballyhooed arrival of EMV (Chip and PIN) credit cards is now well under way, and most, if not all, major U.S. banks have already swapped out their customers’ old credit cards for those with EMV chips. As background, the Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more

Fraud Detection

Fraud Detection That Accounts for Misclassification Using Cost-Sensitive Logistic Regression

Share Button

This article is a continuation of a previous post entitled “Evaluating a Fraud Detection Using Cost-Sensitive Predictive Analytics.” Read more