Energy & Utility September 15, 2014 Massively Distributed Citadel Malware Targets Middle Eastern Petrochemical Organizations 5 min read - According to IBM Trusteer researchers, massively distributed Citadel malware is targeting nonfinancial petrochemical companies in the Middle East.
Advanced Threats July 9, 2014 7 Recommendations for Defending against Advanced Persistent Threats (APTs) 3 min read - A new study reports many IT security professionals are pessimistic about their ability to reduce the frequency and severity of advanced persistent threats.
Advanced Threats May 6, 2014 3 Advanced Threat Protection Essentials 5 min read - Today's advanced attacks are more targeted and complex than ever. When it comes to advanced threat protection (ATP), you need an integrated approach.
Advanced Threats May 5, 2014 An Intelligent Approach to Stopping Advanced Threats 4 min read - Organizations require an intelligent approach to protecting their critical data against advanced threats, zero-day attacks and breaches.
Malware March 17, 2014 Killer Music: Hackers Exploit Media Player Vulnerabilities 3 min read - IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Malware September 24, 2013 Keep It Simple, Stupid: The Zeus Version 3 min read - According to IBM's Amit Klein, organizations protected against malware variants like Zeus are forcing cyber criminals to revert to simpler hacking methods.
Malware September 12, 2013 Fake News: Syrian Crisis News Used to Spread Information-Stealing Malware 2 min read - Emails advertising fake news about the crisis in Syria are spreading information-stealing malware to those who click on them.
Fraud Protection March 31, 2013 The Evolution Fighting Fraud With Software 6 min read - In the past several years both financial fraud and IBM Security Trusteer Rapport have made huge leaps in technology.
Endpoint February 6, 2013 Endpoint Security: No Admin Rights, No Malware? Yeah, Right! 2 min read - Endpoint security can be compromised if employees have permission to make administrative changes on company devices. However, they may still be at risk.