From Fraud Intelligence

DKIM

Leveraging the Power of Email Authentication – Part 1: What is DMARC?

Share Button

This article is Part 1 of our “Leveraging the Power of Email Authentication” series. Read Part 2: Using DKIM to Enable DMARC and Part 3: Implementing DKIM.

A business can ensure its email is accurately delivered to inboxes around the world and reject the delivery of phishing. Read more

EMV adoption

Effects of EMV Adoption: Have We Seen any Changes in Criminal Patterns?

Share Button

The much ballyhooed arrival of EMV (Chip and PIN) credit cards is now well under way, and most, if not all, major U.S. banks have already swapped out their customers’ old credit cards for those with EMV chips. As background, the Read more

Fraud Data Scientist

Applying Data Science to Fraud Prevention

Share Button

Eighty thousand Kindle users. Sixty-five million Tumblr users. What do they have in common? Both groups had their login credentials breached, courtesy of hackers. While these attacks didn’t directly target financial Read more

Swordphish Predictive Phishing and Malware Identification

Beta Now Available: Swordphish Predictive Phishing Risk Technology

Share Button

Earlier this year, our Detect Monitoring System team was faced with increased attacks across our customer base. This aligns with the Anti Phishing Working Group’s (APWG) findings Read more

Fraud Detection

Fraud Detection That Accounts for Misclassification Using Cost-Sensitive Logistic Regression

Share Button

This article is a continuation of a previous post entitled “Evaluating a Fraud Detection Using Cost-Sensitive Predictive Analytics.” Read more

New Attack Channels on the Rise – How Search Engine Ads, Social Media and Apps Are Used to Perpetrate Fraud

Share Button

It’s much easier for fraudsters to trick victims into divulging sensitive information than it is to hack usernames and passwords. Read more

New FFIEC Guidance

New FFIEC Guidance: Financial Institutions Must Look Closer at Mobile Banking Security

Share Button

If they haven’t already done so—or haven’t done so in a while– financial institutions in the United States will need to take a fresh look Read more

Phone fraud scams

1-900-FRAUD: When Fraudsters Come Calling

Share Button

Hackers. Fraudsters. Shysters. No matter what name society has given them they’ve been around since time immemorial, banking on the fact (pun intended) that there’s a sucker born every minute.And while each of us likes to think that Read more

AdWords phishing schemes

When AdWords Attack: Another Method of Phishing

Share Button

Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google Read more

Mobile Fraud Management Solutions Vendor

Easy Solutions Included in Mobile Fraud Management Solutions Vendor Landscape Research Report

Share Button

We’re proud to announce that we have been included among mobile fraud management solution vendors Read more