Advanced Threats March 24, 2020 TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany 13 min read - Our team is closely monitoring TrickBot's developing capabilities, including its new cross-channel attacks using the TrickMo component.
Fraud Protection April 4, 2017 Trust, but Verify: Authentication Without Validation Is Naïve 3 min read - Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
July 19, 2016 Phone Verification May Not Catch Premium Number Costs 2 min read - Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
March 18, 2015 Yahoo Mail Announces New Security Measures 2 min read - At the SXSW conference, Yahoo announced it will implement on-demand passwords and data encryption for its Yahoo Mail in order to improve security.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Malware December 18, 2013 Bitcoin Exchange in China: ‘Gameover?’ 2 min read - As the mainstream media continues to cover bitcoin exchange as a popular Web currency, cyber criminals are increasingly doing the same to launder money.
Fraud Protection March 19, 2013 Is Your Risk Engine Shortsighted? Improve Its Vision With a Holistic View 3 min read - A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.
Fraud Protection July 19, 2012 Real-Time Credentials Theft: Your Risk Engine Won’t Catch This One 3 min read - Sometimes, credential theft isn't flagged by banks' typical risk engines and can only be detected by malware prevention tools such as Trusteer Pinpoint.
Endpoint March 13, 2012 SIM-ple: Mobile Handsets Are Weak Link in Latest Online Banking Fraud Scheme 3 min read - Two online banking fraud schemes, which defeat banks' one-time password (OTP) authorization systems, show how personal data is vulnerable through mobile.
Data Protection November 9, 2010 Real-Time Phishing Takes Off 3 min read - The use of real-time phishing to bypass two-step authentication is on the rise, and online banking customers should be on guard.