Mobile Fraudsters Gone in a (Device) Flash

By | July 5th, 2016|Threat Blogs|

A version of this post appears in both Mobile Commerce Daily and Mobile Marketer.  Device fingerprinting, i.e., collecting information from a device for the purposes of identification, is one of the main techniques used by online services for fraud detection. The goal is to recognize “bad” devices used by fraudsters, such that they can be [...]

Are You Paying for Fake App Installs?

By | April 6th, 2016|Threat Blogs|

A version of this post also appeared on Mobile Advertising Watch. The mobile app landscape is extremely competitive. With more than three million apps available today in the major app stores, a new app has slim chances of standing out and making it to the top of the charts. Install ad campaigns are increasingly popular (if [...]

The Anatomy of an Account Takeover Attack

By | February 24th, 2016|Threat Blogs|

As we mentioned in our recent Predictions for 2016, it’s likely that account takeover attacks (ATO) will skyrocket this year as result of the many data breaches we witnessed in 2015. Cybercriminals put the work into stealing your data, now it’s time to put that data to work for them. ATO attacks fuel the underground [...]

Virtual Goods, Real Fraud

By | January 21st, 2016|Threat Blogs|

The recent announcement from Activision Blizzard to acquire King Digital Entertainment, maker of the hit game Candy Crush, for a staggering $5.9 billion certainly turned some heads. Is there really that much money in the mobile gaming industry? In a word, yes, but it’s not just the game makers who look to profit. With the [...]

Cyber Attackers Turn Location-Based Services Against You

By | December 1st, 2015|Threat Blogs|

  Image source: Facebook Social spam is not new. We've all experienced our share of unsolicited comments, stranger friend requests, phishing links, fake reviews, and click-baiting. But as online services introduce new features to make connecting and sharing content easier than ever, social spam is rapidly taking on new shapes and forms. Different [...]

Top 5 Predictions for Online Fraud in 2016

By | November 23rd, 2015|Threat Blogs|

As 2015 comes to a close, all of us fighting fraud may start preparing for the upcoming fraud battle in 2016. As mobile apps and web services continue to increase in number and functionality, they remain an attractive target for fraudsters. Meanwhile, cyber attackers have continued to adapt to evade traditional security defenses – using [...]

The Changing Tide of Financial Fraud

By | November 17th, 2015|Threat Blogs|

On October 1, the financial payments world was abuzz with talk about how the increased adoption of the new EMV standard for credit card purchases was going to bring about dramatic changes to the amount of fraudulent transactions. Likely we will see a reduction in the amount of "brick and mortar" fraudulent transactions. But unfortunately [...]

How To Register Millions of Fake Accounts With Ease

By | September 29th, 2015|Threat Blogs|

With the plethora of security solutions created over the years to prevent the creation of fraudulent accounts, why are fake accounts still so prevalent? Recent studies show that approximately 10 percent of accounts on social media sites are fake [1,2]. Other reports are more drastic: Instagram’s crackdown on spam accounts in December of last year [...]

The Underground Market for User Accounts

By | September 15th, 2015|Threat Blogs|

User accounts are extremely valuable. This is not only true for Internet properties, which are valued by the size and growth of their user base, but also for professional online criminals exploiting these platforms for a profit. The prevalence of these user accounts in the underground market proves this is a common problem across all [...]

The Hidden Enemy Threatening Your Online User Growth

By | August 31st, 2015|Threat Blogs|

We are entering an era of billions of users and trillions of online accounts. This is attracting a growing wave of attacks targeting online services of all sizes. The Internet user population is now 3 billion strong [1]. There are now over 3 million mobile apps and online services available, and most people have registered [...]