2 min read - Recent malware trends to note include the evolution, maturation and diversification of the attacks and fraud schemes they facilitate.
6 min read - Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.
7 min read - Malware authors have created variants to monitor Web sessions between a customer and their bank in order to change data in real time and steal information.
< 1 min read - Trusteer's security research group has identified what it believes will be the top five most dangerous trends in malware in 2013.
3 min read - Prinimalka-Gozi, a new type of malware, will reportedly be used in a massive coordinated attack on U.S. banks called Project Blitzkrieg.
2 min read - A new Universal-Man-in-the-Browser attack collects data submitted to all websites without the need for post-processing.
2 min read - A new Tatanga attack uses MitB software to bypass chipTAN systems to steal user data. The attack creates instructions for a fake transaction.
2 min read - A sophisticated man-in-the-browser (MitB) enterprise attack has been found to target users on virtual private networks at a major international airport.
4 min read - Tilon, a new type of malware, contains some behaviors identical to those exhibited by Silon and is known for its ability in avoiding detection.
2 min read - Software firm Maplesoft recently incurred an email database breach. The attackers sent phishing emails containing the Zeus banking Trojan to customers.
3 min read - IBM has identified a new scam that targets Facebook users, asking for donations to children's charities in order to steal financial data.
3 min read - Sometimes, credential theft isn't flagged by banks' typical risk engines and can only be detected by malware prevention tools such as Trusteer Pinpoint.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.