Shpu Thrasio Adds Product Development, Launch Capabilities to Acquisition Expertise
San Francisco-based FinTech EarnUp, which focuses on payment and data solutions for the mortgage industry, has closed an oversubscribed $31 million Series C financing round, according to a company press release Tuesday March 15 .New strategic investors LendingTree and KeyBank joined EarnUps fundraising round along with instituti <a href=https://www.stanley-germany.de>stanley quencher</a> onal investors Bain Capital Ventures, SignalFire, Blumberg Capital and Flourish Ventures.Per the release, EarnUp will use the money to expand its payment and data flow solutions for the mortgage industry, which aim to support borrowers, lenders and servicers.Additionally, EarnUp has worked since its last funding round to digitize the mortgage payments process and help people achieve financial clarity, from purchase or refinancing all the way through to loan and close. EarnUps values are exemplified with this latest round of funding, Nadim Homsany, EarnUp co-founder and CEO, said in <a href=https://www.stanley-cups.ro>stanley cupe</a> the release. We are fearlessly challenging a flawed financial system and creating an environment of exceptional people <a href=https://www.stanley-cups.it>stanley borraccia</a> and partnerships. The addition of strategic investments from LendingTree and KeyBank shows that EarnUp is moving in an intentional direction that will have a positive impact on the mortgage and consumer debt industries. Earlier this month, MT Bank Corp CEO Ren茅 Jones made the case for holding digital banks to the same regulatory standards as traditional financial institutions FIs .Related: MT Bank CEO Calls for More FinTech RegulationIn his a Fxsm Nipendo Expands Access to Its Automated Invoicing Feature
Security researchers discovered new Android adware yesterday Nov. 5 that has hidden itself within thousands of mobile applications, such as popular titles like Snapchat, Twitter, Facebook and more, ZDNet reported.According to Lookout Security, th <a href=https://www.stanley-cup.us>stanley website</a> e m <a href=https://www.stanleycup.fr>stanley mug</a> obile security firm that discovered the new trojanized adware, users with infected devices are being forced to replace thei <a href=https://www.stanleycup.pl>stanley cup</a> r phones because the bugs are almost impossible to remove. Lookout has detected over 20,000 samples of this type of trojanized adware masquerading as legitimate top applications, including Candy Crush, Facebook, GoogleNow, NYTimes, Okta, Snapchat, Twitter, WhatsApp and many others, the company said in a blog post.According to Lookout, the malicious code has been repackaged and injected into some of the most popular applications available on Google Play. The security firm believes that while many of the apps are fully functional and provide their normal services, they also carry the adware code that then roots itself within the targeted device. Unlike older types of adware that were obvious and obnoxious, prompting users to uninstall them, this new type of adware is silent, working in the background, Lookouts blog post continued.For now, the company confirmed that there seems to be no indication that users who have installed these infected apps have actually been affected.But Lookout did warn about this particular class of trojanized adware becoming more sophisticated over time, leveraging its root privil