Security researchers recently identified two malware distribution campaigns that infect customers of Brazilian financial institutions with banking Trojans.
In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.
One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.
When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both?
Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience.
Shir Levin used to report on government and law, but her journalism career wasn't data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.
Business email compromise scams are still surprisingly lucrative. In fact, the volume and frequency of BEC attacks have skyrocketed in recent years, according to FBI data.
Newly discovered phishing campaigns are targeting WordPress users with malicious emails designed to steal user credentials.
Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users' everyday lives.
The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.