PerimeterXinPerimeterXGuaranteed Scarcity Brings Sellouts, Frenzied Buyers, and Scalper BotsHow do retail brands create intense demand for extremely high-priced products? Supreme is among the brands that have found the right…Mar 2, 2018Mar 2, 2018
PerimeterXinPerimeterXValentines Day Heartbreakers — Gift Card Balances StolenApproaching Valentine’s Day, or any other landmark sentimental day, gift card sales leap. The peak is the day before Valentine’s, as buyers…Mar 2, 2018Mar 2, 2018
PerimeterXinPerimeterXFive Easy Ways To Identify Bot Attacks On Your SiteMalicious bots are likely visiting your website. The question is, can you identify them in order to single them out and mitigate their…Feb 28, 2018Feb 28, 2018
PerimeterXinPerimeterXThe Super Awesome, Easy to Follow, Step-by-Step Guide for Setting Up Appium for Automated iOS…So you built a kickass iOS app. You install it on your iPhone, play around with it, perform some basic manual tests and everything simply…Dec 29, 2017Dec 29, 2017
PerimeterXinPerimeterXScalper Bots: How To Stop Toy Scalping AttacksLike many human parents, you are poised to buy an Alien Zombie Doll, the hottest holiday toy, when they go on sale in a moment, at select…Dec 29, 2017Dec 29, 2017
PerimeterXE Commerce Fraud Detection: Holiday Security Threats and SolutionsThe 2017 holiday season is projected to bring sales revenue gains of 18 to 21 percent over last year, Cybercriminals read the same…Dec 29, 2017Dec 29, 2017
PerimeterXSocial Media Login Security: Issues, Risks and Tips for Cyber SecurityAs originally published in InfoSecurity MagazineDec 29, 2017Dec 29, 2017
PerimeterXHow We Define ‘Good Bots’ At PerimeterXAs originally published in DARKReadingDec 29, 2017Dec 29, 2017
PerimeterXAccount Takeover on Mobile AppsAutomated attacks aren’t unique to websites alone. Running mobile applications exposes you to just as much risk of automated bot attacks…Dec 29, 2017Dec 29, 2017
PerimeterXOnline Gift Card Fraud: Free Moccachino for Life?Gift cards can be compromised online through bruteforce or “educated guessing” techniques, but to cash in, the cyber criminal may want to…Dec 29, 2017Dec 29, 2017