July 31, 2017 How to Shake the Hook After a Phishing Attack 2 min read - Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
Identity & Access July 12, 2017 Outsider or Insider: Who Will Cause Today’s Data Breach? 2 min read - Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
June 29, 2017 Change of Style in Phishing Attacks Creates Fresh Concerns for Big-Name Brands 2 min read - Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
Software Vulnerabilities May 30, 2017 Relying on Data to Mitigate the Risk of WordPress Website Hijacking 9 min read - To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Fraud Protection April 17, 2017 Phishing Attacks Collect 70 Percent of Credentials Within the First Hour 2 min read - With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.
Fraud Protection April 5, 2017 Cybercriminals Riding Tax Filing Tides: Tax Fraud Season in Effect < 1 min read - IBM X-Force researchers discovered that the volume of spam email campaigns carrying tax fraud scams rises sharply during the months surrounding tax season.
April 3, 2017 Malware Attack Targets Open Source Developers 2 min read - A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Fraud Protection March 27, 2017 Hey Phishing, You Old Foe — Catch This Cognitive Drift? 4 min read - Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
Threat Intelligence March 13, 2017 Enticing Clicks With Spam 5 min read - According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.