From Uncategorized

Fraud Beat 2018

The Fraud Beat 2018 – The Latest Attacks and Trends

Share Button

The threat has never been greater – attacks are reaching unprecedented levels of complexity and criminals are ever more innovative in their fraud strategies. Read more

Card Not Present

Card Not Present Fraud Is Still on the Rise: Can Anything Be Done?

Share Button

EMV was expected to help prevent fraud involving counterfeit credit cards. While the incidence of counterfeit card fraud has dropped, there has been a corresponding (and steady) rise in card not present fraud. Read more

Social Media Breaches

Personal Social Media Breaches Today Will Cause Business Headaches Tomorrow

Share Button

This week, techies and non-techies alike scrambled to learn the ins and outs of what transpired between Facebook and Cambridge Analytica, a political firm hired by the Trump campaign that acquired access to private data on millions of Facebook users. Read more

From Real-Time Learning to Reinforcement Learning with Asynchronous Feedback

Share Button

Online, or real-time, transactional fraud detection systems have recently created quite the buzz in the info security industry. Read more

DKIM

Why Combatting Phishing and External Threats Require More Than Just DMARC

Share Button

Email authentication is a pillar to effective digital threat protection, but it shouldn’t stand alone. The latest example solidifying the need to go beyond authenticating emails comes from an attack leveraging the United States Postal Service (USPS) brand. Read more

Proactive fraud prevention

Fraud Prevention: Driving Innovation as Digital Transactions Grow Exponentially

Share Button

We’ve all heard the phrase “the best defense is a good offense.” The analogy proves as true on the football field as it does in the field of online fraud prevention. Too many instances exist where companies rush to implement Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more

AdWords phishing schemes

When AdWords Attack: Another Method of Phishing

Share Button

Cybercriminals are taking advantage of the effectiveness of Google AdWords and are using the ads for phishing schemes.As recently as two years ago, more than a third of Google Read more

FFIEC Assessment Tool

Fervor Over "Voluntary" FFIEC Assessment Tool: What Your FI Needs to Know

Share Button

Banks, holding companies and other financial institutions are calling on the FFIEC to make changes to its Cybersecurity Assessment Tool Read more

DMARC Compass Explorer - DMARC Readiness Assessment Tool

Share Button

Last November, we launched a new product called DMARC Compass.  DMARC Compass is designed to provide organizations with instant visibility into how many criminals are using their domain to send spam and phishing attacks. DMARC Compass has been a huge success and early feedback from our clients has been extremely positive. Read more