From Advanced Threats

Mobile Payment Apps

Can Smartphones Solve ATM Skimming?

Share Button

ATM skimming remains a big business for organized crime rings. According to a recent article in, card skimming accounted for more than $2 billion in losses. One new approach that banks are exploring to mitigate this particular vector of fraud, is the notion of using smartphones as a second Read more

Games With A Purpose – Fraud

Share Button

Human-based Computation Games, also known as Games with a Purpose, have been used by the software industry to accomplish tasks that although trivial for human beings, still pose a Read more

DMARC Compass Explorer - DMARC Readiness Assessment Tool

Share Button

Last November, we launched a new product called DMARC Compass.  DMARC Compass is designed to provide organizations with instant visibility into how many criminals are using their domain to send spam and phishing attacks. DMARC Compass has been a huge success and early feedback from our clients has been extremely positive. Read more

Malware Attacks Target Enterprises across Borders

Share Button

As we have predicted, hackers are eagerly (and successfully) branching out to verticals outside the financial sector. Below we demonstrate how a malware attack was executed under the name of a government agency, targeting the finance department of an enterprise. Read more

Anthem Records Hacked

80M Anthem Records Hacked: Where’s My Data Going? Who’s Buying?

Share Button

Details continue to emerge on the massive breach at health care company Anthem, in which hackers have gained access to information including names, birthdays, medical IDs, Social Security Numbers, street addresses, email addresses and employment information (including income), on up to 80 million people. Read more

Hotel Points and Airline Miles Fraud – Wait, What?!

Share Button

At Easy Solutions we spend a lot of time thinking, talking and researching fraud: fraud on different parts of the world and across different verticals, from the most complex to the simplest methodologies. Even with all the different variables that make up these kinds of crimes, one thing is the same across all kinds of electronic fraud—their lifecycle. The lifecycle of a fraud incident is made of three key stages: Read more

Dating Site Breached: 20M Credentials Stolen

Share Button

A hacker calling himself “Mastermind” is claiming to be in possession of over 20 million credentials for an unnamed dating site. These credentials are claimed to be 100% valid in a posting to a paste site. Included in the list are over 7 million credentials from Hotmail, 2.5 million from Yahoo and 2.2 million from Read more

State of the Union Address

Cybersecurity Becomes a Focus in 2015 State of the Union Address

Share Button

In last night’s State of the Union address, President Obama urged Congress to pass legislation to better protect Americans from cyberattacks. The directive comes on the heels of concerning findings recently unveiled by ISACA:

Read more

DMARC Compass Offers New Powerful Features

Share Button

Easy Solutions is committed to supporting the emerging DMARC email authentication standard to help our customers communicate confidently and securely with their customers. We listened to your feedback and included some key features in this DMARC Compass™ release that improve performance, usability and management. Read more


“Data URI” Phishing Attacks Now Target US Banks

Share Button

Over time there is a natural tendency towards attack complexity as defensive countermeasures improve. The Easy Solutions DMS team is focused on attack detection and removal on behalf of our clients and we have monitored this trend for years. Recently we’re detected a resurgence in an attack type called “Data URI” phishing. Read more