The company plans to use the new funds to expand its portfolio to support data privacy and compliance risks – with a focus on regulations such as GDPR, CCPA, and the Children’s Online Privacy Protection Act (COPPA) –, and to expand its global presence. Pixalate LogoFounded in 2012 and headquartered in Santa Monica, California, Pixalate…

As the holiday shopping season shifts into high gear, the COVID-19 pandemic is accelerating an ongoing trend: shoppers are opting to buy online. Rather than flooding brick-and-mortar stores — and point-of-sale (POS) machines — with sales, studies suggest a high percentage of shoppers in 2020 will be using online options and e-commerce checkout pages. And,…

What Are the Seven Biggest Social Media Scams of 2018?

The massive rise in popularity of social platforms has led to a huge upswing in social media scams — putting a growing pool of users at risk. Facebook had 2.23 billion monthly active users as of the second quarter of 2018, while photo-sharing site Instagram hit 1 billion monthly active users by June 2018, according…

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gone are the days of the Nigerian prince promising fortune to unsuspecting email recipients. Attackers have stepped up their phishing game and evolved their tactics to entice employees to click links or open attachments, preying on the opportunity to spread persistent malware or compromise credentials. These threat actors relentlessly target employees — both at work…

Fighting Financial Fraud in an Increasingly Digital World

Everywhere we look, we see some form of digital technology. People have access to computers, cellphones, televisions and even Wi-Fi-enabled smart appliances. Technology advances every day, giving way to exciting, innovative and life-changing experiences. Take cellphones, for example. Not too long ago, cellphones were a luxury. They were used simply to call people — texting…

Subtlety Is the Danger for Cybercrime Security Efforts

Celebrities who appear to be suddenly successful have long been called “overnight sensations.” In reality, most of these instant stars worked for years to perfect their skills before they got their big break. Cyberattacks often follow the same trajectory. They are not always immediately disruptive because they are executed stealthily over long periods of time….