From Research

AI vs AI

AI vs AI – Can Predictive Models Stop the Tide of Hacker AI?

Share Button

Long ago, the introduction of the internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes game of detection and prevention, always working to stay one step ahead of fraudsters. Read more

Machine Learning Naive Bayes

Machine Learning Algorithms Explained – Naive Bayes Classifier

Share Button

In our series Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.  Read more

Malicious Extension

Video Blog: Malicious Browser Extension

Share Button

Cyber fraud is always evolving, and criminals are always looking for new ways to monetize vulnerabilities in online systems. The latest trendy target: Browser Extensions. Read more

Malicious Extension

Ominous “Live Weather” Browser Extension Manipulates Users’ Browsing

Share Button

The “Colombia Weather Live” extension appeared on multiple browsers, including Google Chrome and Mozilla Firefox, and was downloaded by more than 10,000 users. In the video, we talked about the main actions of the attack Read more

DMARC

DMARC: Which Government Agencies Get a Passing Grade?

Share Button

It’s long been widely accepted throughout the security industry that email is the number one attack vector exploited by fraudsters. While enterprises have been working to seal off this channel, government entities have been slower to act. Read more

Machine Learning K-Means

Machine Learning Algorithms Explained – K-Means Clustering

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods. Read more

Random Forests

Machine Learning Algorithms Explained – Random Forests

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Decision Trees

Fraud Detection by Stacking Cost-Sensitive Decision Trees

Share Button

Easy Solutions data scientists will present their research on the use of ensembles of cost-sensitive decision trees to detect fraudulent transactions at the Data Science for Cyber Security Conference in London this week. The article below details some of the findings. Read more

Decision Trees

Machine Learning Algorithms Explained – Decision Trees

Share Button

In our new series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Marcher

Marcher Trojan Isn’t Going Away. It’s Getting Smarter.

Share Button

The Android Trojan called Marcher first came onto the scene in 2013, but it’s not showing any signs of going away. Read more