January 28, 2015 FBI Warns Ransomware Issue Needs Widespread Public Attention 2 min read - The FBI says ransomware is targeting consumers and businesses and spreading via pop-up windows on websites instead of just email spam.
X-Force January 21, 2015 ‘Blackhat’: Hollywood’s Latest Take on Hacking 3 min read - "Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
Banking & Finance January 20, 2015 Is Financial Malware Breaking the Bank? 3 min read - Financial malware is on the rise, according to a new Trusteer study that takes a hard look at the life cycle of these fraudulent transactions.
Malware January 19, 2015 Do You Trust Your Browser? Fake Browser Fraud Schemes Discovered in Brazil 6 min read - IBM Trusteer recently uncovered a fake browser fraud scheme in Brazil that works to steal online banking credentials from unsuspecting victims.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
November 26, 2014 Hack-y Holidays? Phishing Scams and Malware on the Rise, Says US-CERT 2 min read - According to US-CERT, phishing scams and malware are on the rise during the holiday season, and consumers must keep an eye out for warning signs.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Fraud Protection September 3, 2014 How Cybercriminals Monetize Information Obtained From Social Networks 6 min read - As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
Identity & Access June 4, 2014 Identity and Access Management (IAM) on the Move 3 min read - Identity and access management systems were tested in 2013, a year that saw 822 million records compromised. Here's what you need to know.
Fraud Protection April 30, 2013 Fraudsters Have Stepped up Their Social Engineering Tactics 3 min read - If fraudsters can't deceive users, their business fails. Malware now requires perfectionism and hackers are beefing up their social engineering tactics.