49 Posts

Amit Klein

CTO, Trusteer, an IBM company

    As Trusteer’s CTO, Amit Klein is responsible for researching and introducing game changing technologies into Trusteer’s products, with particular focus on Turtseer’s enterprise solutions. Prior to that, Mr. Klein established, managed and grew the company’s security group, which is one of the world’s leading financial malware research groups. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire, now part of IBM Security Systems), where he was responsible for the security content of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics from the Hebrew University of Jerusalem (through IDF’s Talpiot programme).Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA US, FSISAC, OWASP, Microsoft BlueHat, InterOp USA, AusCERT and CertConf.

    Written By Amit Klein

    The Most Dangerous Malware Trends for 2014

    Recent malware trends to note include the evolution, maturation and diversification of the attacks and fraud schemes they facilitate.

    Multistage Exploit Kits Boost Effective Malware Delivery

    Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.

    Back to Basics: Malware Authors Downgrade Tactics to Stay Under the Radar

    Malware authors have created variants to monitor Web sessions between a customer and their bank in order to change data in real time and steal information.

    5 Most Dangerous Trends in Malware in 2013

    Trusteer's security research group has identified what it believes will be the top five most dangerous trends in malware in 2013.

    Project Blitzkrieg: How to Block the Planned Prinimalka-Gozi Trojan Attack

    Prinimalka-Gozi, a new type of malware, will reportedly be used in a massive coordinated attack on U.S. banks called Project Blitzkrieg.

    One Size Fits All: Universal-Man-in-the-Browser Attack Targets All Websites

    A new Universal-Man-in-the-Browser attack collects data submitted to all websites without the need for post-processing.

    Tatanga Attack Exposes chipTAN Weaknesses

    A new Tatanga attack uses MitB software to bypass chipTAN systems to steal user data. The attack creates instructions for a fake transaction.

    Man-in-the-Browser: Citadel Trojan Targets Airport Employees With VPN Attack

    A sophisticated man-in-the-browser (MitB) enterprise attack has been found to target users on virtual private networks at a major international airport.

    Tilon: Son of Silon

    Tilon, a new type of malware, contains some behaviors identical to those exhibited by Silon and is known for its ability in avoiding detection.

    Banking Trojan Silently Hacks Into Enterprises

    Software firm Maplesoft recently incurred an email database breach. The attackers sent phishing emails containing the Zeus banking Trojan to customers.