Fraud Protection October 1, 2014 Fraud Risk Engines: The Statistics Are Not in Your Favor 4 min read - The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Endpoint September 29, 2014 Corporate Credentials Protection: Do You Know Where Your Passwords Are? 3 min read - Protecting corporate credentials is becoming increasingly important as more high-profile breaches have compromised hundreds of millions of user accounts.
September 25, 2014 DoubleClick Attack May Mean ‘Malvertising’ Is About to Get Much Worse 2 min read - An attempt to distribute malware via online ad network DoubleClick and Zedo could be a possible example of "malvertising" targeting consumers through ads.
Malware September 22, 2014 Tinba Malware Reloaded and Attacking Banks Around the World 5 min read - IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
Banking & Finance September 15, 2014 Dyre Banking Trojan Used in APT-Style Attacks Against Enterprises 3 min read - SalesForce is warning its customers that they might have been targeted by the Dyre Trojan. Banking trojans are not just targeting financial organizations.
Energy & Utility September 15, 2014 Massively Distributed Citadel Malware Targets Middle Eastern Petrochemical Organizations 5 min read - According to IBM Trusteer researchers, massively distributed Citadel malware is targeting nonfinancial petrochemical companies in the Middle East.
Data Protection September 5, 2014 Free Mobile Apps: What Is the Cost of These Permissions? 5 min read - There's no such thing as a "free" app. What data are free mobile apps collecting, how is it used and what can companies do to protect themselves?
Fraud Protection September 3, 2014 How Cybercriminals Monetize Information Obtained From Social Networks 6 min read - As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
August 28, 2014 Backoff Hacker Tool: Secret Service Warns Target Malware Still Active 3 min read - According to a recent Secret Service and Department of Homeland Security release, the Backoff hacker tool is still alive and well in American POS systems.