October 13, 2014 Cybercriminals Brag They’re Ready to Release 200,000 Snapchat Photos 2 min read - Cybercriminals on social media are claiming they have stolen hundreds of thousands of photos and images from Snapchat users that they will expose online.
CISO September 24, 2014 How a CISO Can Use Home Field Advantage to Defeat Attackers 4 min read - How CISOs and security leaders should use their home field advantage and play to their strengths to win the battle against malicious attackers.
Malware September 22, 2014 Tinba Malware Reloaded and Attacking Banks Around the World 5 min read - IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
Fraud Protection September 3, 2014 How Cybercriminals Monetize Information Obtained From Social Networks 6 min read - As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
Endpoint August 13, 2014 Stolen Password? How to Not Be the Next Victim of Corporate Password Theft 3 min read - Although many organizations have a policy that prohibits reusing corporate credentials on third-party sites, these password rules are hard to enforce.
Fraud Protection July 7, 2014 Cyber Criminals Never Sleep, Nor Should Your Fraud Prevention 4 min read - Cyber criminals have substantial capabilities, operate 24/7 and are counting on your lack of education and fraud prevention know-how as their allies.
Fraud Protection December 5, 2013 Cyber Criminal’s Dilemma: Is Bitcoin a Platform or a Target? 5 min read - The IBM Trusteer security team recently analyzed a malware variant designed specifically to target Bitcoin and other virtual currencies.
Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Malware November 21, 2013 The Most Dangerous Malware Trends for 2014 2 min read - Recent malware trends to note include the evolution, maturation and diversification of the attacks and fraud schemes they facilitate.
Software Vulnerabilities November 5, 2013 Are Cyber Criminals Looking to Target SAP Users? 2 min read - The new variant of the Shiz Trojan malware targets mission-critical enterprise resource planning (ERP) applications — particularly SAP users.