In order to get safe online, bank site users must remain vigilant offline. That means questioning callers posing as banks who request personal information.
The IBM research team recently uncovered a stealthy new attack carried out by the SpyEye Trojan that circumvents mobile SMS security.
To validate and secure financial transactions, numerous banks are using transaction verification systems. However, a bank heist is still possible.
It seems that SpyEye distributors are catching up with the mobile market as they have finally begun targeting the Android mobile platform.
Over time, the Ramnit worm has morphed into a financial malware — or is at least being used as a platform to commit financial fraud.
The SpyEye Trojan has added several more financial institutions to its target list worldwide. The malware has also adapted to their latest defenses.
Hiloti generic downloader is a Trojan that was first seen in 2008. The malware has shown up again in larger numbers in many banks across the U.K.
IBM has uncovered a new SpyEye configuration. The Trojan targets users of two leading European airline travel websites.
LinkedIn spam emails exploit users' tendency to follow links from social networks, then steal sensitive data from their computers.
SpyEye uses a technique called HTML injection to modify the pages presented in victims' browsers and capture credit card information.