Healthcare May 12, 2017 The Doctor Is In: Building a Security Immune System for Health Care 2 min read - A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
May 11, 2017 UK, Netherlands Emerge as Growing Hotspots for Originating Cyberattacks 2 min read - More than half of the world's cyberattacks now originate from EMEA countries, with the Netherlands being ground zero for 38 percent of phishing scams.
May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Fraud Protection May 2, 2017 Gone Phishing: Don’t Fall for the Bait 3 min read - Phishing attacks used to be the work of hobbyists, but now professional fraudsters are leveraging stolen credentials to compromise multiple accounts.
April 20, 2017 Email Tracking Is More Than a Marketing Tool 2 min read - Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
April 18, 2017 Punycode Enables Invisible Phishing Attacks 2 min read - Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
Fraud Protection April 17, 2017 Phishing Attacks Collect 70 Percent of Credentials Within the First Hour 2 min read - With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.
April 5, 2017 Airline Phishing Attack Targets Businesses 2 min read - Barracuda Networks observed a phishing attack that used fraudulent airline tickets to trick victims into volunteering corporate credentials.
April 3, 2017 Malware Attack Targets Open Source Developers 2 min read - A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Fraud Protection March 27, 2017 Hey Phishing, You Old Foe — Catch This Cognitive Drift? 4 min read - Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.