![]() Easy Solutions delivers this platform to more than 200 leading enterprises and financial institutions worldwide, protecting their end-users against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and providing multifactor authentication and transaction anomaly detection.įighting fraud is and has been difficult. To keep tabs on the threat creators, Villadiego and his team of experts, continuously monitor these illicit marketplaces, as part of their Total Fraud Protection platform. This way, organizations can better protect themselves and their end-customers from increasingly sophisticated fraud.” ![]() In understanding these black markets, our goal is to provide organizations the ability to rapidly identify the cards that are compromised and reduce the time to containment or replacement. “Criminals continue to improve the quality of these sites, making it easier for the end-buyers to target their usage of these cards,” said Ricardo Villadiego, CEO of Easy Solutions.“Banks and other Financial institutions are fighting an asymmetrical war against these highly-organized, well-run markets. To understand this piece of the puzzle, Easy Solutions, the only security vendor focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds, studies credit card black markets in-depth. However, the million dollar question is about the whereabouts of the 40 million compromised credit cards, the ways they were packaged and sold, and the nature of these markets. The end user can still make the final decision on whether to allow the process to connect to the Internet after being warned, though this is not recommended.Īlso, Detect Safe Browsing version 4.0.3 for Mac has been released, and includes performance-enhancing platform changes that provide an essential gateway to the future product features we have planned down the line.Ricardo Villadiego, Founder & CEO The massive Target credit card breach continues to make headlines as lawsuits get filed, and lawmakers try to unsuccessfully engineer legislation to prevent this situation from occurring again.This helps to reduce fraud across the entire customer population, even for those end users who don’t have DSB installed on their devices. The URLs on the blacklist are placed there through the concept of Collaborative Protection, which uses any malicious process found on one device running DSB to provide fraud intelligence for the early detection and deactivation of sites hosting malware and attacks.Any process that wants to connect to the Internet using a URL on the blacklist will automatically be blocked on the device running DSB and placed in the Lockbox, which quarantines all processes suspected of being malicious. ![]() The introduction of the Lockbox for isolating malicious processes in the Windows version of DSB.
0 Comments
Leave a Reply. |