From Fraud Intelligence

Massive Phishing Email CampaignMassive Phishing Email Campaign

Massive Phishing Email Campaign Affecting Major Bank Detected by DMARC Compass

Share Button

For a while now, we have been talking about the importance of businesses taking back control of their email channel, to minimize the impact of phishing attacks against their brand and end-users. Since its inception, DMARC Compass® Read more

OPM Breach notifications change course

OPM Breach Notifications Change Course – It’s Time to Rethink Identity

Share Button

A few months ago, when the OPM breach first hit, and the OPM said it would leverage a third-party to send out notification emails to affected individuals about the compromise, we warned of the dangers of this approach. Read more

email business compromise

CEO Fraud Up 270% to $1.2B – Here’s How It Almost Happened to Us

Share Button

Earlier this month, we published a post on how scammers tried to impersonate our CEO’s email, to convince our CFO to make fraudulent payments to a compromised account. Now, the FBI has released updated statistics, showing that we are definitely not alone. As Krebs on Security reports:  Read more

FORTUNE: Banks Put Hacked Credit Cards on Watch Lists to Help Reduce Fraud Costs

Share Button

Fortune Magazine penned an article recently, on how banks are putting hacked credit cards on ‘watch lists’, rather than canceling them immediately, thereby helping banks (and therefore their end users), reduce the overall cost of fraud to an organization. As our CEO, Ricardo Villadiego, notes in the article, ‘”Fraud is a numbers game.” Read more

growing spear phishing

Leveraging DMARC to Combat Growing Spear Phishing and Insider Attacks

Share Button

For the greater part of 2015, both the FBI and the U.S. Secret Service have issued warnings that 2015 could be the year of Spear Phishing. Recently, the U.S. Secret Service issued a new bulletin, warning again that they are seeing a “significant increase in the frequency, sophistication, and fraud losses” associated with these new attacks. Read more

OPM Breach

OPM Breach: From Bad to Worse

Share Button

Last week, millions of government employees were probably quite nervous to hear that their personal data had been stolen by hackers (likely from China), who gained access to a trove of data from the Office of Personnel Management. This week, the same office is opening up even more government employees to more risk, based on their response to the breach. The OPM announced that they will notify all impacted individuals by email, which makes not only the affected individuals, but also anyone else who is worried that they might be affected, now a ripe target for a phishing attack.

Read more

HCE, APIs and Mobile Payment Apps – A New Opportunity for Fraudsters

Share Button

Over the past six months, there have been a number of changes in the way the big payment and mobile technology players have approached security for payment apps.

It had been widely anticipated that the launch of Apple Pay in October 2014 would have a big impact, in part due to the technical aspects of the service. Expectations that the launch would disrupt Read more

DMARC Webinar

Webinar: Who is Using Your Domain for Phishing & Spam?

Share Button

Phishing costs businesses over $2 Billion in losses every year, but email remains a critical communication channel. DMARC (Domain Message Authentication Reporting and Conformance) is a free standard that stands to change all that by providing visibility into email flows, telling email receivers to delete spoofed messages, and ensuring that only legitimate emails are delivered to inboxes from protected domains.

In this session, our CTO Dan Ingevaldson will cover: Read more

Fraud Intelligence Portal

The New Easy Solutions Customer Portal Streamlines Fraud Detection and Prevention

Share Button

We often hear fraud managers being dissatisfied with their current anti-fraud posture and believing that comprehensive protection is overly complicated and overly expensive. Not only is integrating separate solutions from a variety of vendors difficult, costly and time consuming, but oftentimes different services from the same vendor are nearly Read more

How Deep Does the Web Go?

Share Button

Like an iceberg, a large portion of the Internet is obscured from easy view. That’s right. It is literally a “hole” new world. This unindexed section of the Internet is dubbed “the Deep Web” and more and more criminal activity is moving away from the light of day and into to the shadowy corners.

Today, the Deep Web has evolved and has turned into an immense information-sharing tool that is making it easier for criminals to do their job more thoroughly. Read more