1912, 2019

Fraud Protection: Keeping Up With Attackers

In a video interview at Information Security Media Group's recent Fraud and Breach Summit in Washington, Cardoza discusses The biggest risks that organizations face in offering digital services to consumers.

1112, 2019

3 Ways to Protect Your Small Business from Phishing Attacks

Mobile malware is real. Following the trend of more and more services to go mobile, fraudsters are going in the same direction as they're moving very fast from developing PC's malware to smartphone ones.

Load More Posts
PDF product sheet
DOWNLOAD
PDF product sheet
DOWNLOAD
PDF product sheet
DOWNLOAD
PDF product sheet
DOWNLOAD
1004, 2018

White Paper – Intel – Android Ubiquitous leakage through VFS (CVE-2017-13165)

As widely known, the Android operating system is based on Linux. Even if it has been subjected to a heavy customisation to improve it in terms of performance and security on mobile/embedded devices, it still [...]

2712, 2016

White Paper – The analysis conducted on the malware PowerFakeToken

The analysed malware, internally baptised as PowerFakeToken, has been identified to belong to the Android/FakeToken.A family. In a nutshell, the mentioned malware family pretends to be a mobile token generator, typically used for transaction validation [...]

Load More Posts