There’s a sucker born every minute. And for each sucker there are hundreds of scammers waiting to take advantage of them.Now, with the Olympic Games
This article is a continuation of a previous post entitled “Evaluating a Fraud Detection Using Cost-Sensitive Predictive Analytics.”
New Attack Channels on the Rise – How Search Engine Ads, Social Media and Apps Are Used to Perpetrate Fraud
It’s much easier for fraudsters to trick victims into divulging sensitive information than it is to hack usernames and passwords.
A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how
Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords.
United Kingdom’s Decision to Mandate DMARC Compliance: Good for the Government, Great for the Public
According to an article that ran in The Guardian, in 2012 United Kingdom topped the global list of nationstargeted by phishing
If they haven’t already done so—or haven’t done so in a while– financial institutions in the United States will need to take a fresh look
Just over two months after sophisticated cybercriminals used the SWIFT system to steal $81 million from a bank in New York, another such attack has come to light,
Hackers. Fraudsters. Shysters. No matter what name society has given them they’ve been around since time immemorial, banking on the fact (pun intended) that there’s a sucker born every minute.And while each of us likes to think that
Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google