Dark Reading: How to Reduce Spam & Phishing with DMARC

Share Button

reduce spam and phishing with DMARCEasy Solutions expert commentary on the topic of how to reduce spam and phishing with DMARC was recently featured in Dark Reading. While email is a mission-critical communication channel for most companies, it has also become an untrusted one.

Read more

DetectID Expands Frictionless Mobile Authentication and Enrollment Capabilities

Share Button

Frictionless Mobile AuthenticationDetectID, Easy Solutions’ flexible authentication platform, just made strong mobile authentication for businesses and their users even simpler. The newest version of DetectID expands the functionality of the SDK-based mobile authentication solution. Mobile Authentication is built from the ground up to provide frictionless authentication using native push notifications, soft token and QR Code. The new features in the latest edition of DetectID include: Read more

How Deep Does the Web Go?

Share Button

Deep WebLike an iceberg, a large portion of the Internet is obscured from easy view. That’s right. It is literally a “hole” new world. This unindexed section of the Internet is dubbed “the Deep Web” and more and more criminal activity is moving away from the light of day and into to the shadowy corners. Read more

DMARC Compass Explorer – DMARC Readiness Assessment Tool

Share Button

DMARC Readiness Assessment ToolLast November, we launched a new product called DMARC Compass.  DMARC Compass is designed to provide organizations with instant visibility into how many criminals are using their domain to send spam and phishing attacks. DMARC Compass has been a huge success and early feedback from our clients has been extremely positive. Read more

Using Smart Phones to Improve Bank and Apple Pay Security

Share Button

Apple Pay SecurityIn the last two days, we have seen a lot of media coverage around Apple Pay being used for fraudulent activities by criminals with stolen identities and credit cards. The news were first reported by The Guardian. Many of the articles highlight that fraud is stemming from a back door in the activation process called the “yellow path”. The yellow path is the process by which the bank can put the card activation on hold to do additional verifications. Read more

How Same-Day ACH Transactions Will Affect Your Fraud Prevention Operations

Share Button

Same Day ACH The implementation of same-day Automated Clearing House (ACH) transactions has been getting a good amount of media attention lately. In a letter to NACHA (the Electronic Payments Association) on February 4, the American Bankers Association expressed their support for a proposal to implement same-day ACH transactions. ABA believes that widespread adoption of same-day ACH transactions represents a fundamental step to promote faster payments across the entire industry, as it would level the competitive playing field for all financial institutions while allowing account holders to benefit from expedited settlement. Read more

Introducing Detect Safe Browsing Clientless – Transparent Malware Detection that Covers All Users

Share Button

Transparent Malware DetectionMan-in-the-Browser (MITB) and web injection attacks are the most devastating threat on the Internet today, resulting in infinite number of compromised accounts. These attacks infect a webpage by taking advantage of security vulnerabilities in browsers and common web plugins, modifying web pages and transactions as they are happening in real time. Cybercriminals launching an MITB attack can intercept and change the content on a website by injecting new HTML code and perform unauthorized transactions while a customer has an online banking session open, but the client will only see the transaction performed as they intended on their screen. Read more

Fraud Intelligence Report Templates Now Available with Detect Monitoring Service

Share Button

Fraud managers spend a staggering amount of time making sense of the data resulting from fraud intelligence tools. The newest version of our proactive fraud intelligence and brand protection solution, Detect Monitoring Service, now allows fraud managers to build customized reports with all of the anti-fraud information that Detect Monitoring Service collects, personalized to meet their specific needs. Read more

Malware Attacks Target Enterprises across Borders

Share Button

As we have predicted, hackers are eagerly (and successfully) branching out to verticals outside the financial sector. Below we demonstrate how a malware attack was executed under the name of a
government agency, targeting the finance department of an enterprise.

Read more

80M Anthem Records Hacked: Where’s My Data Going? Who’s Buying?

Share Button

Anthem Records HackedDetails continue to emerge on the massive breach at health care company Anthem, in which hackers have gained access to information including names, birthdays, medical IDs, Social Security Numbers, street addresses, email addresses and employment information (including income), on up to 80 million people. Read more