Fraud Protection July 7, 2014 Cyber Criminals Never Sleep, Nor Should Your Fraud Prevention 4 min read - Cyber criminals have substantial capabilities, operate 24/7 and are counting on your lack of education and fraud prevention know-how as their allies.
Fraud Protection June 12, 2014 Services from the Underground Market: One Stop Shop for New Identities 2 min read - Modern cyber crime includes not just malware, phishing and targeted attacks, but also identity theft and identity forgery, which are regaining momentum.
Fraud Protection April 1, 2014 The Next Evolution of Spam: Spam Is Not Dead 2 min read - After a new fraud-as-a-service capability was introduced in an online cyber crime community, it became clear that fraudsters are still interested in spam.
Fraud Protection December 5, 2013 Cyber Criminal’s Dilemma: Is Bitcoin a Platform or a Target? 5 min read - The IBM Trusteer security team recently analyzed a malware variant designed specifically to target Bitcoin and other virtual currencies.
Banking & Finance November 20, 2013 Out of the Shadows: i2Ninja Malware Exposed 3 min read - Trusteer's security team has recently identified a new malware variant in a Russian cyber crime forum known as the i2Ninja malware.
Software Vulnerabilities November 5, 2013 Are Cyber Criminals Looking to Target SAP Users? 2 min read - The new variant of the Shiz Trojan malware targets mission-critical enterprise resource planning (ERP) applications — particularly SAP users.
Data Protection July 3, 2013 FBI Warns of Increase in Spear-Phishing Attacks 2 min read - Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Fraud Protection April 17, 2013 Behavioral Profiling: Finding the Man Who Wasn’t There 4 min read - Behavioral profiling can help catch cyber criminals, but criminals have developed many tactics to dodge these efforts.
Malware December 5, 2012 5 Most Dangerous Trends in Malware in 2013 < 1 min read - Trusteer's security research group has identified what it believes will be the top five most dangerous trends in malware in 2013.
Malware June 26, 2012 À la Carte: Criminals Charging Per Custom Webinject Feature 2 min read - According to recent research on webinject trends, cyber criminals are now selling customized webinjects that are priced per feature.