BankBot, a very simple and spiteful Trojan, has been targeting Android devices since 2016. Now it’s back, and it’s stronger than ever. This particular Trojan is well-known thanks to its
Email authentication is a pillar to effective digital threat protection, but it shouldn’t stand alone. The latest example solidifying the need to go beyond authenticating emails comes from an attack leveraging the United States Postal Service (USPS) brand.
Machine Learning Explained Machine learning models are often dismissed on the grounds of lack of interpretability. There is a popular story about modern algorithms that goes as follows:
Easy Solutions recently updated its customer portal with the goal of improving user experience and better tracking the effectiveness of our Digital Threat Protection solutions.
A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals.
Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches.
Machine learning has never been more prevalent and accessible than it is today. It has managed to influence and boost several industries and markets. Retailers use it for product recommendations, email providers use it to filter spam, social networks use it for face recognition and sentiment analysis, and the list goes on and on. The …
This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
A vicious malware attack spread to nine of the biggest banks in Chile last month. At least 854 machines were impacted by this attack. The first attack’s transmission began with an
In 2016, we published more than 50 blog posts about authentication, fraud trends, data breaches, new attacks, fraud prevention best practices and more. We also developed more content based on our research team’s findings to better protect against fraud. We are committed