Skip to content

CAPTCHA Codes: Are They the Best Fraud Prevention Solution for Your Business?

As cybersecurity experts, it’s been fascinating to watch the evolution of CAPTCHA. While you are probably familiar with the acronym, you may not know that CAPTCHA stands for “Completely Automated Public Turing Test To Tell Computers and Humans Apart,” coined by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University

In Support of 2FA: Why NIST’s Recommendation Is a Step in the Wrong Direction

The following post first appeared on LinkedIn. In case you missed it, let’s recap last week’s rollercoaster of cybersecurity news. The U.S. National Institute for Standards and Technology (NIST) released their draft Digital Authentication Guideline (Special Publication 800-63) for public comment, which included a recommendation to deprecate SMS-based two-factor authentication. What followed was a media

Coupon and Promo Abuse: Stop Users From Taking You for a Ride

Coupon and promo codes have been a tried and true method of attracting new business. While customer acquisition is always a good thing, businesses should be on the lookout for users attempting to exploit these efforts for their own fraudulent gains. In an ideal world, the coupon or promo code entices new users to sign

Are Passwords Leaving You and Your Users Vulnerable?

In 2016 alone, millions of records have already been exposed that include usernames and passwords. This is in addition to past breaches such as MySpace and LinkedIn, which are now resurfacing old data and wreaking havoc on users who secure multiple sites with the same credentials. No one is immune…not even Mark Zuckerberg. Here at

Is Your Business Impacted by IRSF Attacks? We Can Help

International Revenue Share Fraud (IRSF) attacks. They are one of the telcom industry’s most persistent problems and when your business is targeted, it costs you money. IRSF has been steadily increasing over the past 10 years and its perpetrators are dedicated to ensuring that it continues to be a highly profitable and hard-to-stop crime. We’ve

The Cost-Effective Way to Verify Users and Increase Security

Headlines around the world remind us that breaches have become commonplace for far too many businesses. Establishing reliable end-user security is now a requirement for any Web or mobile application in the market.  Phone-based verification is a simple way to help protect your brand and your business, and more specifically for end-users, extending security options

Common Questions About Two-Factor Authentication

Websites worldwide offer two-factor authentication (2FA), but a large number of consumers do not fully understand the technology, and therefore have not taken the steps to turn it on and protect their accounts. To help make the Internet a safer place for all, we decided to jump in and answer some frequently asked questions about

7 Things You Need to Know about International SMS

Ok, I get it, international SMS is complicated, now what? If your business needs international reach with SMS, make sure to ask these questions of any potential vendor: Understanding all the intricacies of International SMS messaging can be daunting, especially if your provider doesn’t give you much help. However, if global reach is a necessity

Lessons on Online Relationships from the Manti Te’o Hoax

Whether or not you’re an avid college football fan, you’ve probably heard some recent news coverage about the Manti Te’o hoax. Manti Te’o is the Notre Dame linebacker and 2012 Heisman Trophy runner-up whose romantic relationship with girlfriend Lennay Kekua was publicly revealed to be a hoax.  Te’o had dated Kekua online from October 2011

Social Networks: The Real Cost of Hacking and Spam (Part 2)

Last time we talked about how much fraud costs an individual user when an online account is compromised. What happens to a social network’s user once they leave? Do they ever come back or are they forever a lost customer? In a digital age where the newest thing is always one step away, the answer

Social Networks: The Real Cost of Hacking and Spam (Part 1)

A prominent blogger’s social networking account was hacked earlier this year. According to the article, the account was hacked, and the blogger’s username, password, and phone number listed on the website were used to set up another fake account to spam her friends with fake solicitations for branded goods. To top it off, the hackers