12 Posts

George Tubin

Sr. Security Strategist

George Tubin is the Senior Security Strategist for Trusteer, an IBM company, where he heads the thought leadership program to advance online and mobile banking security and adoption, and advise enterprises on best practices for protecting corporate assets from targeted attacks. With over 25 years in the banking and high-technology industries, his areas of expertise include consumer online and mobile banking, online fraud and identity theft prevention, and enterprise fraud management strategies.

Written By George Tubin

Boleto Malware: Two New Variants Discovered

Researchers have discovered two additional variants of Boleto malware that operate quite differently from the previously discovered Eupuds malware.

Fraud Prevention on Trial: Effectiveness vs. Convenience

When it comes to online banking, what is considered a commercially reasonable means of fraud protection, and how effective are those means to begin with?

Blacklisting, White-listing and the Way Forward: Comments on the Schneier-Ranum Face-Off

Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.

Is Your Risk Engine Shortsighted? Improve Its Vision With a Holistic View

A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.

Can You Get Rid of Java?

Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.

Live on Video: uMitB Steals ‘Verified by Visa’ and ‘MasterCard SecureCode’ Credentials

A new video shows a uMitB scam stealing "Verified by Visa" and "MasterCard SecureCode" credentials from unsuspecting victims through a webinject.

Endpoint Security: No Admin Rights, No Malware? Yeah, Right!

Endpoint security can be compromised if employees have permission to make administrative changes on company devices. However, they may still be at risk.

Malvertising Campaigns Get a Boost From Unpatched Java Zero-Day Exploits

A new type of malware distributes Blackhole exploit kits that compromise user endpoints through malicious advertising, or "malvertising."

Advanced Malware Represents a Small Percentage of Enterprise Threats, But Packs Highest Impact

Businesses should protect themselves against advanced malware; although it makes up a small sliver of malware threats, its impact can be devastating.

PATCO Reimbursed for Online Fraud Losses as Liability Shifts to Banks

With People's United Bank assuming liability for PATCO's financial online fraud losses, a precedent has been set regarding banks' responsibilities.