Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
After a new fraud-as-a-service capability was introduced in an online cyber crime community, it became clear that fraudsters are still interested in spam.
Recently a colleague sent me a .docx which triggered on our scanning engine. Being the optimist me, I personally view such incidents positively; it either proves the accuracy of our engine if it is a true positive, or offers an opportunity to...
Social media and phishing exploits are going to get more sophisticated. Cyber attackers are exploiting influence tactics to create trust and risk. A look behind six psychological elements behind sophisticated cyber attacks.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Malware authors have created variants to monitor Web sessions between a customer and their bank in order to change data in real time and steal information.
Two online banking fraud schemes, which defeat banks' one-time password (OTP) authorization systems, show how personal data is vulnerable through mobile.