Skip to content

Search results

Social Networks: The Real Cost of Hacking and Spam (Part 1)

A prominent blogger’s social networking account was hacked earlier this year. According to the article, the account was hacked, and the blogger’s username, password, and phone number listed on the website were used to set up another fake account to spam her friends with fake solicitations for branded goods. To top it off, the hackers

5 Easy Password Best Practices to Protect Yourself from a Hack!

In light of Mat Honan’s recent hacking nightmare, it has become apparent that we all need to be more proactive about our personal account security. Here are 5 Password Best Practices: 1. Use strong passwords – the more complex your password is, the harder it is for fraudsters to guess it or hack it. 2.

Can Biometrics be Fooled?

In the movies, iris scanning protects high-security vaults and super-secret labs while personalizing billboard ads. In the real world, it helps New York City police track prisoners, screens employees of Bank of America Corp. and travelers at London’s Heathrow Airport. Outside of transplanting dead eye balls, as Tom Cruise did in Minority Report, surely you

Phone Verification: A Critical Fraud Prevention Tool

Telesign Phone Verification is fast becoming a critical piece of fraud prevention strategies and increasingly helping organizations automate the manual review process.  Interestingly, based on CyberSource’s recent 2012 Online Fraud Report, it was estimated that $3.4 Billion were lost to online fraud in 2011 alone and merchants were rejecting an average of 2.8% of their

Telesign Introduces REST APIs

One of the things Telesign is working on in Q1 is making our APIs available via a REST interface. Today all of our customers access our APIs via SOAP and we’ve definitely heard that folks want us to provide our APIs in an alternative form since almost all Web Services today use REST. When developing