Ask Your Fraud Expert

What do we mean when we talk about In-App Protection?

When you distribute a security-critical app to the consumer or to enterprise users, you want to be sure that it cannot be attacked to steal data. To do that, you should put inside the app some technology able to protect the app itself and report to you if something goes wrong.

November 21st, 2019|

Onboarding threats for Challenger Banks

Banking onboarding is the action of integrating a new customer in banking services. Online onboarding involves more chance to incur identity theft.

November 7th, 2019|

6 ways to understand if you are threatened by a Phishing Email

Since every one of us has probably, at least once, received a phishing email, it's crucial to have a precise understanding of how to protect yourself.

September 26th, 2019|

What is Phishing?

Dating back to the 90s Phishing is one of the oldest types of cyberattacks and still one of the most widespread because of techniques becoming increasingly sophisticated.

September 19th, 2019|

8 tips to avoid installing mobile malware on your smartphone

Mobile malware is real. Following the trend of more and more services to go mobile, fraudsters are going in the same direction as they're moving very fast from developing PC's malware to smartphone ones.

September 4th, 2019|

How to defend your endpoints from RAT!

A Remote Access Trojan aka RAT is malicious software that provides the attacker with unlimited access to the victims' endpoints.

July 31st, 2019|

5 tips to avoid C-level fraud

Would you be suspicious about your receiving an email from your CEO asking for an urgent payment?

July 25th, 2019|

How to avoid an SMS Grabbing Attack?

An SMS grabbing attack is a widespread attack on Android mobile devices whose goal is to intercept the user's SMS used as a second authentication factor or "account recovery" code.

July 10th, 2019|

What do you know about Mobile Overlay attacks?

A Mobile Overlay attack is a widespread attack on Android mobile devices whose goal is to intercept credentials for accessing a target application via a Trojan about popular online services (retail, payment, and banking).

July 3rd, 2019|

SimSwap Attacks: how they work and how to protect yourself!

A SimSwap is a type of ATO (Account Takeover) that focuses on the weaknesses of the identification process that involves the SIM card.

June 26th, 2019|