In our series Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.
In our new series, Expert Video Series, we speak with cybersecurity experts about their perspectives on the fraud landscape.
Cyber fraud is always evolving, and criminals are always looking for new ways to monetize vulnerabilities in online systems. The latest trendy target: Browser Extensions.
The “Colombia Weather Live” extension appeared on multiple browsers, including Google Chrome and Mozilla Firefox, and was downloaded by more than 10,000 users. In the video, we talked about the main actions of the attack
It’s long been widely accepted throughout the security industry that email is the number one attack vector exploited by fraudsters. While enterprises have been working to seal off this channel, government entities have been slower to act.
Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies.
Account takeover (ATO) – it’s the ultimate goal of most fraud attacks, and already causes at least $6.5 billion to $7 billion USD in annual losses across multiple verticals.
As 2017 draws to a close, we here at Easy Solutions have been reflecting on the biggest fraud events of the year. These seven events changed the fraud landscape and left lasting effects on organizations and their outlook on security for years to come.
In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.
Predictions 2018: Human Manipulation Is the Standard, Obsessing Over End User Authentication Becomes the Norm
As 2017 comes to a close, people start to take stock of the past year and what’s in store for the coming one.Not ones to be left out, we’ve compiled our own list of what we can expect to see on the cyber threat landscape in 2018.