//Ask Your Fraud Expert

6 ways to understand if you are threatened by a Phishing Email

Since every one of us has probably, at least once, received a phishing email, it's crucial to have a precise understanding of how to protect yourself.

September 26th, 2019|

What is Phishing?

Dating back to the 90s Phishing is one of the oldest types of cyberattacks and still one of the most widespread because of techniques becoming increasingly sophisticated.

September 19th, 2019|

8 tips to avoid installing mobile malware on your smartphone

Mobile malware is real. Following the trend of more and more services to go mobile, fraudsters are going in the same direction as they're moving very fast from developing PC's malware to smartphone ones.

September 4th, 2019|

How to defend your endpoints from RAT!

A Remote Access Trojan aka RAT is malicious software that provides the attacker with unlimited access to the victims' endpoints.

July 31st, 2019|

5 tips to avoid C-level fraud

If your CEO sends you an email asking you to make an urgent payment, would you be suspicious of an email from him?

July 25th, 2019|

How to avoid an SMS Grabbing Attack?

An SMS grabbing attack is a widespread attack on Android mobile devices whose goal is to intercept the user's SMS used as a second authentication factor or "account recovery" code.

July 10th, 2019|

What do you know about Mobile Overlay attacks?

A Mobile Overlay attack is a widespread attack on Android mobile devices whose goal is to intercept credentials for accessing a target application via a Trojan about popular online services (retail, payment, and banking).

July 3rd, 2019|

SimSwap Attacks: how they work and how to protect yourself!

A SimSwap is a type of ATO (Account Takeover) focuses on the weaknesses of the identification process that involves SIM card.

June 26th, 2019|

What is the difference between Passive and Active Biometrics?

The distinction between active and passive biometrics is based on the enrollment mode (activation) or training needed to be able to recognize the user.

June 6th, 2019|