Machine learning has never been more prevalent and accessible than it is today. It has managed to influence and boost several industries and markets.
This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
A vicious malware attack spread to nine of the biggest banks in Chile last month. At least 854 machines were impacted by this attack. The first attack’s transmission began with an
In 2016, we published more than 50 blog posts about authentication, fraud trends, data breaches, new attacks, fraud prevention best practices and more. We also developed more content based on our research team’s findings to better protect against fraud. We are committed
The threat landscape continues to be ever changing and complicated, and 2017 will be no different. Some attacks that we saw emerge in 2016 will escalate, while new and dynamic fraud attacks will also emerge. As organizations try to stay one step ahead of today’s sophisticated cybercriminals, we will
Online shopping sales alone this holiday season are expected to hit $117 billion and that spells big profits for retailers and big opportunity for those who aren’t concerned with receiving a lump of coal in their stocking.
Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction.
Fraudsters are getting ever more creative. Every app and device is now an avenue for new threats seeking to capture the personal information of end users. Not long ago, we wrote about Remote Access Threats (RAT), which aim to access users’ cameras and microphones.
This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention. Read the first and second installments. The most common way to mitigate phishing attacks is by warning end users that they have navigated to a phishing website, for which the browser must
Fraudsters and cybercriminals react to the introduction of new security solutions by moving to a different part of the value chain or by changing and updating their attack methods.This is why it is important to have a holistic strategy