From Advanced Threats

New Attack Channels on the Rise – How Search Engine Ads, Social Media and Apps Are Used to Perpetrate Fraud

Share Button

It’s much easier for fraudsters to trick victims into divulging sensitive information than it is to hack usernames and passwords. Read more

phishing

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

Share Button

A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more

Mobile Tokens Are More Effective with a Fortified Device

Share Button

Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords. Read more

DMARC compliance

United Kingdom's Decision to Mandate DMARC Compliance: Good for the Government, Great for the Public

Share Button

According to an article that ran in The Guardian, in 2012 United Kingdom topped the global list of nationstargeted by phishing Read more

New FFIEC Guidance

New FFIEC Guidance: Financial Institutions Must Look Closer at Mobile Banking Security

Share Button

If they haven’t already done so—or haven’t done so in a while– financial institutions in the United States will need to take a fresh look Read more

blogs

Could Anything Have Prevented SWIFT Attacks Against Banks?

Share Button

Just over two months after sophisticated cybercriminals used the SWIFT system to steal $81 million from a bank in New York, another such attack has come to light, Read more

Phone fraud scams

1-900-FRAUD: When Fraudsters Come Calling

Share Button

Hackers. Fraudsters. Shysters. No matter what name society has given them they’ve been around since time immemorial, banking on the fact (pun intended) that there’s a sucker born every minute.And while each of us likes to think that Read more

AdWords phishing schemes

When AdWords Attack: Another Method of Phishing

Share Button

Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google Read more

Behavioral anomaly detection

Thieves Steal $13M in 2 Hours Using Fake Credit Cards – How Can Banks Protect Themselves?

Share Button

News broke recently that thieves stole about $13M in cash from the South African Standard Bank Group Read more

Clustering of Phishing Attacks

Share Button

Easy Solutions data scientists, including the author of this article, will present extensive research on phishing patterns and correlations between attacks. Read more