The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware.
In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.
As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering.
Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.
The U.S. Secret Service is investigating a new ATM attack that, unlike previous "cash-out" attacks, uses advanced, custom-build skimmers to steal credit card information and PINs.
Researchers discovered a new ATM fraud scheme that attacks both the front and back ends of ATM networks virtually, making it harder to remediate than traditional schemes that target physical machines.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Would-be threat actors who lack technical skills can take advantage of cybercrime-as-a-service offerings that facilitate DDoS and other attacks for as little as $10.
According to IBM's "Future of Identity Study," consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.
As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.