Malware September 14, 2015 Don’t Click on That! Practical User Education for Ransomware and Other Malware 4 min read - Malware and ransomware can strike users who aren't aware of best practices or common attack techniques, so it's up to security teams to raise awareness.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
September 9, 2015 WhatsApp Web Client Hit With Business Card Blunder 2 min read - The WhatsApp Web client is now vulnerable to a vCard-led attack, according to researchers. How can users patch the vulnerability and avoid the issue?
September 9, 2015 Image Issues: Google Play Apps Hit by CAPTCHA-Cheating Malware 2 min read - A new type of Trojan has been sneaking into the Google Play store and could be infecting the mobile devices of unsuspecting users.
Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Malware September 3, 2015 Malicious Attachments Make a Comeback as Top Attack Vector 2 min read - Users need to be on the lookout for malicious attachments, which are growing in popularity thanks to spear phishing and social engineering.
Fraud Protection September 2, 2015 Customer Experience: A Casualty in the War Against Cybercrime 3 min read - Financial institutions are trying to protect customers from fraud, but their efforts often leave much to be desired with respect to the customer experience
Malware September 2, 2015 How to Stop a Botnet Created by Angler Exploit Kits 3 min read - The Angler exploit kit has been responsible for the vast majority of botnets created over the past year. Here's how it works and how to stop it.
September 1, 2015 Why Google and Amazon’s Moves Against Flash Player May Not Cover All the Security Holes 2 min read - Google and Adobe are limiting the ability of Adobe's Flash Player to run multimedia ads, but those actions may not be enough to stop cybercriminals.