JESSE JAMES' 6-STEP GUIDE TO MOBILE BANKING THEFT
A look into tactics used by hardened banditos, gunslingers, and garden-variety hackers.
Prior to 1900, fewer than 10 bank robberies took place in the "Wild West".
In contrast, there were over 4 million financial attacks on mobile phones in 2014 alone.
one of the most successful bank
heists in the Wild West.
stolen by Zeus in 2012,
a mobile banking Trojan.
A look into tactics used by hardened banditos, gunslingers, and garden-variety hackers.
Outlaws identify vulnerabilities, then develop exploits. If they don’t have the skills, they hire a bounty hunter on the black market.
Long coats, bandanas and pistols are passé. Today phishing emails and infected websites are the weapons of choice to secretly install malware on victims' phones.
No (virtual) guns blazing: outlaws have the username, password, and authentication code. They can now drain the bank account.
There is no need for saddled horses waiting to whisk the gunslingers to safety. The mobile malware deletes itself without leaving a trace!
Better than the telegraph – it alerts you if your data was leaked in a security breach.
We check every site you access against our cloud database and block them before they load.
We block all banking Trojans and infected apps from ever getting onto your phone.
Password protect your sensitive apps.
Remotely trigger a yell to find a lost or misplaced phone.
Remotely lock your phone at any time.
In case all else fails, remotely delete all your phone's data.
Pinpoint your phone's location on a map.
Let the person who finds your phone contact you with one tap on the home screen.
Administer your security from behind the bench (aka dashboard): from where you can remotely activate your remote anti-theft tools.