Fraud Protection December 11, 2017 ‘Tis the Season for Increased Cybersecurity Vigilance 3 min read - Cybersecurity vigilance is crucial during the holiday shopping season, but it's equally important to carry that security awareness into the new year.
Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
Advanced Threats July 15, 2015 Building a Cyberattack: Social Engineering, Zero-Day Vulnerabilities and More 3 min read - Many cybercriminals today use social engineering as a means of carrying out attacks. In fact, this method is among the most popular attack types.
Advanced Threats June 15, 2015 Cybercrime Ecosystem: Everything Is for Sale 2 min read - The current cybercrime ecosystem puts resources at the fingertips of criminals, making it easier to carry out more extensive or sophisticated attacks.
Fraud Protection April 21, 2015 Taking Evasive Actions Against Cyberfraud 2 min read - Cybercriminals are investing time and effort to improve their cyberfraud techniques in order to evade detection by security researchers and solutions.
Malware February 17, 2015 The Darknet Isn’t Just for Dark Deals 2 min read - When discussing the darknet, the focus has shifted from its use as infrastructure for malware communication to the hidden services it offers.
Fraud Protection October 1, 2014 Fraud Risk Engines: The Statistics Are Not in Your Favor 4 min read - The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Malware August 14, 2014 New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques 2 min read - A new Bugat malware variant is using techniques similar to the Gameover Zeus HTML injections to target banking applications and steal user credentials.
Malware July 29, 2014 Citadel’s New Trick: Persistent Device Remote Control 3 min read - Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.
Banking & Finance July 11, 2014 The Father of Zeus: Kronos Malware Discovered 3 min read - Researchers at Trusteer, an IBM company, recently discovered the Kronos malware, which offers compatibility with Zeus, in a Russian cyber crime forum.
Banking & Finance June 24, 2014 Court Ruling: Authentication Is Not Effective Fraud Protection 2 min read - A recent court ruling claims that legacy authentication solutions are not effective fraud protection and are no longer effective against cyber criminals.