E-commerce and Retail

phishing attack example

Breaking up the Phishing Attack Chain

Breaking up the Phishing Attack Chain Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing … Read More

phishing spam example

Why all the Spam? How Phishing Emails Get to You

How Phishing Emails Get to You A phishing attack is any communication (email, SMS, instant messaging) campaign launched by a malicious actor to steal personal data and credentials. Phishing attacks are one of the biggest threats to data security. According … Read More

ransomware attack example

Ransomware and Supply Chains

The Low Hanging Fruit: Your Vendors And Partners Ransomware is a growing threat to any organization, government or business. In Canada alone, it is estimated that ransomware attacks and the associated downtime cost our economy CAD$2.4 billion in 2020. HOW … Read More

loyalty fraud

5 Trends in Loyalty Program Fraud in Canada

5 Trends in Loyalty Program Fraud in Canada Loyalty programs have grown tremendously in the last decade. Memberships rose to 3.8 billion members recently , with a total value of USD$323 billion for the ecosystem. Loyalty program fraud has significantly … Read More

prevent account takeover ecommerce retail

Preventing Account Takeover in E-Commerce And Retail​ – August 2020 Webinar Video

Preventing Account Takeover in  E-Commerce And Retail Webinar by David Hétu, Flare Systems and Pharid Jaffer Digitalization, cloud based-services, and the rise of online marketplaces and services have increased the number of entry points for malicious actors who want to … Read More

leaked credentials webinar

Exploring Leaked Credentials: Practical Guide To Account Takeovers Prevention​ – June 2020 Webinar

Exploring Leaked Credentials: Practical Guide To Account Takeovers Prevention Data Security – Threat Intelligence – External Threat Protection Watch the video! As the workplace has moved online and an increasing number of employees begin to work from home, the challenges … Read More

What Does The "Free" in Free Food Really Mean?

What Does the “Free” in Free Food Really Mean?

What Does the “Free” in Free Food Really Mean? Hijacked accounts are one of the most common items available for purchase on online illicit markets. On our blog, we’ve discussed in the past the issue of bank credentials being put … Read More

The Risks Of Using Corporate Emails For Personal Services

The Risks of Using Corporate Emails for Personal Services

The Risks Of Using Corporate Emails For Personal Services Everyday, Flare Systems collects leaked usernames and passwords on the internet and the darkweb. Our customers use our extensive leaked credentials database to prevent credential stuffing attacks. Credential stuffing happens when … Read More

What Passwords Do Fraudsters Use?

What Passwords Do Fraudsters Use?

What Passwords Do Fraudsters Use? Five years ago, Avast published a blog post that analyzed a database of 2,000 passwords used by hackers. It found that hackers use very easy to crack passwords just like most people. In fact, their … Read More

46M cracked passwords - Are people getting better at securing their accounts?

46M Cracked Passwords – Are People Getting Better at Securing Their Accounts?

46M Cracked Passwords – Are People Getting Better at Securing Their Accounts? A little over a year ago, malicious actors hacked the MyFitnessPal service. With 143 million users, this was one of the largest hack of credentials ever reported. Now, … Read More