March 14, 2015 You’ve Got Email Spoofing: Researchers Expose Flaw in Google Apps Domain Verification Process 2 min read - The discovery of a flaw in Google Apps allowing cybercriminals to conduct email spoofing through the admin console may have some early adopters concerned.
Banking & Finance March 6, 2015 Modernizing Digital Security to Protect Banks From Fraud 2 min read - As cyberattacks intensify, financial institutions need to modernize their digital security to help balance fraud prevention with customer service.
January 16, 2015 DarkComet Malware Weaponizes #JeSuisCharlie Effort 2 min read - Security researchers say cybercriminals are using the #JeSuisCharlie hashtag's popularity to distribute the DarkComet malware to unsuspecting victims.
Intelligence & Analytics January 7, 2015 Malicious Domains Can Give You the .Biz 2 min read - Understanding the common tactics that cybercriminals use to mask malicious domains is key to keeping users from clicking on harmful links.
November 26, 2014 Hack-y Holidays? Phishing Scams and Malware on the Rise, Says US-CERT 2 min read - According to US-CERT, phishing scams and malware are on the rise during the holiday season, and consumers must keep an eye out for warning signs.
November 11, 2014 Masque Attack Switches iOS Apps With Malicious Duplicates 2 min read - The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
October 31, 2014 Microsoft: Crowti Ransomware Infections Spiking 2 min read - A sharp increase in Crowti ransomware infections during October is the latest indication that spam emails are still effective, according to Microsoft.
Fraud Protection October 1, 2014 Fraud Risk Engines: The Statistics Are Not in Your Favor 4 min read - The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Endpoint September 29, 2014 Corporate Credentials Protection: Do You Know Where Your Passwords Are? 3 min read - Protecting corporate credentials is becoming increasingly important as more high-profile breaches have compromised hundreds of millions of user accounts.