/Blog

How to defend your endpoints from RAT!

A Remote Access Trojan aka RAT is malicious software that provides the attacker with unlimited access to the victims' endpoints.

July 31st, 2019|

5 tips to avoid C-level fraud

If your CEO sends you an email asking you to make an urgent payment, would you be suspicious of an email from him?

July 25th, 2019|

3 good reasons to use a passcode on your smartphone

Most of us always have a mobile device in our pockets or bags. We use it for multiple purposes, ranging from social media to online payment. This means our phone is continuously accumulating personal sensitive data that could be quite valuable for fraudsters.

July 18th, 2019|

How to avoid an SMS Grabbing Attack?

An SMS grabbing attack is a widespread attack on Android mobile devices whose goal is to intercept the user's SMS used as a second authentication factor or "account recovery" code.

July 10th, 2019|

What do you know about Mobile Overlay attacks?

A Mobile Overlay attack is a widespread attack on Android mobile devices whose goal is to intercept credentials for accessing a target application via a Trojan about popular online services (retail, payment, and banking).

July 3rd, 2019|

SimSwap Attacks: how they work and how to protect yourself!

A SimSwap is a type of ATO (Account Takeover) focuses on the weaknesses of the identification process that involves SIM card.

June 26th, 2019|

XTN and TypingDNA partner to redefine online banking user experience

TypingDNA partners with XTN Cognitive Security to help banking organizations defend against increasingly sophisticated fraud threats.

June 20th, 2019|

It’s all about the server side | How to really secure your application

How could we live without our smartphone? On the spot, you might be tempted to answer "fine”. The truth is that our lives are deeply linked to our digital presence and it will probably go on like this for many years to come.

June 14th, 2019|

What is the difference between Passive and Active Biometrics?

The distinction between active and passive biometrics is based on the enrollment mode (activation) or training needed to be able to recognize the user.

June 6th, 2019|