Ninety-one percent of cybercrimes and attacks start with a phishing URL capable of making serious inroads in a matter of minutes. Not all attacks, however, are created equal; even hackers would agree.
Long ago, the introduction of the internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes game of detection and prevention
Flexibility is an integral part of any strong fraud-monitoring service. The Risk Controller feature from Detect Safe Browsing Mobile allows financial institutions to create custom tolerance levels for risk factors affecting their end-users
As tax season rolls upon us yet again, businesses are increasingly becoming the target of scammers thanks to the massive amounts of sensitive data they hold
This week, techies and non-techies alike scrambled to learn the ins and outs of what transpired between Facebook and Cambridge Analytica, a political firm hired by the Trump campaign that acquired access to private data on millions of Facebook users.
In our series Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.
In our new series, Expert Video Series, we speak with cybersecurity experts about their perspectives on the fraud landscape.
Cyber fraud is always evolving, and criminals are always looking for new ways to monetize vulnerabilities in online systems. The latest trendy target: Browser Extensions.
The “Colombia Weather Live” extension appeared on multiple browsers, including Google Chrome and Mozilla Firefox, and was downloaded by more than 10,000 users. In the video, we talked about the main actions of the attack
It’s long been widely accepted throughout the security industry that email is the number one attack vector exploited by fraudsters. While enterprises have been working to seal off this channel, government entities have been slower to act.