Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Malware October 24, 2013 Protecting POS Systems From Dexter and Other Advanced Malware < 1 min read - Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.
Fraud Protection July 19, 2012 Real-Time Credentials Theft: Your Risk Engine Won’t Catch This One 3 min read - Sometimes, credential theft isn't flagged by banks' typical risk engines and can only be detected by malware prevention tools such as Trusteer Pinpoint.
Data Protection December 1, 2010 The Golden Hour of Phishing Emails 2 min read - Users who submit data to phishing emails can see the integrity of that information compromised by a fraudster within a 'goldern hour' of 60 minutes.