//Ask Your Fraud Expert

How to defend your endpoints from RAT!

A Remote Access Trojan aka RAT is malicious software that provides the attacker with unlimited access to the victims' endpoints.

July 31st, 2019|

5 tips to avoid C-level fraud

If your CEO sends you an email asking you to make an urgent payment, would you be suspicious of an email from him?

July 25th, 2019|

How to avoid an SMS Grabbing Attack?

An SMS grabbing attack is a widespread attack on Android mobile devices whose goal is to intercept the user's SMS used as a second authentication factor or "account recovery" code.

July 10th, 2019|

What do you know about Mobile Overlay attacks?

A Mobile Overlay attack is a widespread attack on Android mobile devices whose goal is to intercept credentials for accessing a target application via a Trojan about popular online services (retail, payment, and banking).

July 3rd, 2019|

SimSwap Attacks: how they work and how to protect yourself!

A SimSwap is a type of ATO (Account Takeover) focuses on the weaknesses of the identification process that involves SIM card.

June 26th, 2019|

What is the difference between Passive and Active Biometrics?

The distinction between active and passive biometrics is based on the enrollment mode (activation) or training needed to be able to recognize the user.

June 6th, 2019|