Banking & Finance May 11, 2016 It All Comes Out in the Wash: The Most Popular Money Laundering Methods in Cybercrime 3 min read - Cybercriminals often leverage time-tested methods of money laundering to stay undetected and move stolen funds across secret accounts.
Fraud Protection September 16, 2014 The Most Common Schemes for Targeting the Unknowing Money Mule 10 min read - Fraudsters are using money mule scams to get unknowing, vulnerable individuals to unwittingly transfer illegally acquired funds for the criminals.
Fraud Protection September 11, 2014 Emerging Trends in Money Mules Schemes 3 min read - As new technologies and services emerge, money mules and criminal organizations will adapt their tactics to exploit the updated systems.
Malware June 12, 2013 Attention Job Seekers: Zeus Is Recruiting Mules 3 min read - How do criminals continue to reach out to job seekers without raising the suspicion of employment websites?
Malware May 22, 2012 Tatanga Trojan Bypasses Mobile Security to Steal Money From Online Banking Users in Germany 2 min read - A new Tatanga Trojan recently emerged, which uses a MitB attack to bypass mobile security in bank transactions. The scam is commiting fraud in Germany.
Fraud Protection January 17, 2012 Post-Transaction Attacks Expose Weaknesses in Fraud Prevention Controls 3 min read - In light of the discovery of Gameover, banks should reassess the effectiveness of their fraud prevention tools to protect themselves and their customers.