Banking & Finance November 19, 2014 Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutions 5 min read - According to IBM Trusteer researchers, there is a new type of Citadel malware that is compromising password management and authentication solutions.
Malware November 3, 2014 Uncloaking the Dark Arts of Evasive Malware 4 min read - With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Malware September 22, 2014 Tinba Malware Reloaded and Attacking Banks Around the World 5 min read - IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
Malware February 20, 2014 Trusteer Apex Preempts New Point-of-Sale Malware JackPOS < 1 min read - As point-of-sale malwares continue to crop up, it is important to maintain the security of these systems to protect them.
Malware October 24, 2013 Protecting POS Systems From Dexter and Other Advanced Malware < 1 min read - Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.
Malware August 9, 2012 Tilon: Son of Silon 4 min read - Tilon, a new type of malware, contains some behaviors identical to those exhibited by Silon and is known for its ability in avoiding detection.
Fraud Protection July 19, 2012 Real-Time Credentials Theft: Your Risk Engine Won’t Catch This One 3 min read - Sometimes, credential theft isn't flagged by banks' typical risk engines and can only be detected by malware prevention tools such as Trusteer Pinpoint.
Fraud Protection April 15, 2012 Phishing for Security: Security Themed Phishing Emails 2 min read - Social engineering plays an extremely significant role in the success of phishing attacks. Users must be able to identify malicious messages.
Fraud Protection August 22, 2011 Ramnit Evolution: From Worm to Financial Malware 3 min read - Over time, the Ramnit worm has morphed into a financial malware — or is at least being used as a platform to commit financial fraud.