If you’re a US shopper, there’s almost a 50% chance that your information was compromised in the Target breach. So how can fellow retailers and other enterprises avoid this fate?
A inside look at the Kaptoxa/BlackPOS malware, which is believed to be used in the massive Target data breach, with the goal of understanding how it operates and finding ways to detect its network activity.
As the mainstream media continues to cover bitcoin exchange as a popular Web currency, cyber criminals are increasingly doing the same to launder money.
The IBM Trusteer security team recently analyzed a malware variant designed specifically to target Bitcoin and other virtual currencies.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Recent malware trends to note include the evolution, maturation and diversification of the attacks and fraud schemes they facilitate.
Trusteer's security team has recently identified a new malware variant in a Russian cyber crime forum known as the i2Ninja malware.
There has been a lot of excitement and buzz in the industry about Big Data, and how it can be used to amplify Security Intelligence to provide greater protection against advanced threats, fraud, and insider threats. IBM's integrated Security...
How is it that malware can differentiate between being run on real hardware vs being run inside a (system) virtual machine? How exactly do some malware behave differently on real hardware (a bare metal computer system if you will) compared to a...
OBAD has been agreed upon to be one of the most sophisticated piece of android malware and you can find various analysis on the web. In this series we will take it apart together and learn about its functionality and various techniques that it uses...