Fraud Protection April 17, 2013 Behavioral Profiling: Finding the Man Who Wasn’t There 4 min read - Behavioral profiling can help catch cyber criminals, but criminals have developed many tactics to dodge these efforts.
Fraud Protection March 25, 2013 Fraud Prevention on Trial: Effectiveness vs. Convenience 2 min read - When it comes to online banking, what is considered a commercially reasonable means of fraud protection, and how effective are those means to begin with?
Malware December 5, 2012 5 Most Dangerous Trends in Malware in 2013 < 1 min read - Trusteer's security research group has identified what it believes will be the top five most dangerous trends in malware in 2013.
Malware June 26, 2012 À la Carte: Criminals Charging Per Custom Webinject Feature 2 min read - According to recent research on webinject trends, cyber criminals are now selling customized webinjects that are priced per feature.
Malware April 18, 2012 No Reservations: Remote-Access Trojan Pilfers Credit Card Data From Hotels 2 min read - A remote-access Trojan available for sale on underground cyber crime forums attacks hotel PoS systems, stealing guests' payment information.
Fraud Protection April 10, 2012 Zeus Targets Cloud Payroll Service to Siphon Money From Enterprises 3 min read - With critical business services migrating to the cloud, service providers and cloud payroll services have become a prime target for cyber criminals.
Fraud Protection April 3, 2012 Facebook Facelift: Ice IX Malware Injects Fake Page to Commit Credit Card Fraud 3 min read - Our researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account.
Software Vulnerabilities January 18, 2012 Carberp Steals e-Cash Vouchers From Facebook Users 2 min read - A new configuration of the Carberp Trojan targets Facebook users, committing financial fraud by asking them for e-cash to unlock their account.
Data Protection December 1, 2010 The Golden Hour of Phishing Emails 2 min read - Users who submit data to phishing emails can see the integrity of that information compromised by a fraudster within a 'goldern hour' of 60 minutes.
Data Protection November 9, 2010 Real-Time Phishing Takes Off 3 min read - The use of real-time phishing to bypass two-step authentication is on the rise, and online banking customers should be on guard.