Emails advertising fake news about the crisis in Syria are spreading information-stealing malware to those who click on them.
Cyber criminals don't just use MitB malware to attack financial institutions. The latest target is Steam, an online gaming platform full of sensitive data.
Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...
When systems are infected, it is important to apply additional post-infection controls that prevent malware from compromising the endpoint.
Intrusion prevention systems (IPS) have become one of the most critical layers in today's network security infrastructure. Although a mature technology, IPS technology must deal with an even broader and more sophisticated attack spectrum.
Need to convey how enterprise data is at risk from malware that infects the mobile devices of their users. The malware mines for user and enterprise data on the mobile device. If enterprise mobile applications are insecure not protected data is at...
Despite Carberp malware designed to bypass Trusteer Rapport defenses, the security system has held up against attacks made by cyber criminals.
Russian fraud forums abound with exchanges of malicious code. Recently, a forum member has been found selling the Carberp source code for $50,000.
I am planning to do a blog series on Malware Analysis using the Zeus sample that I recently received in an email. The idea is not only to share what it does, but to focus mostly on sufficient details.
Trusteer has recently observed a new Citadel malware variant that targets the Payza online payment platform, which is popular in developing countries.