November 11, 2014 Masque Attack Switches iOS Apps With Malicious Duplicates 2 min read - The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
October 31, 2014 Microsoft: Crowti Ransomware Infections Spiking 2 min read - A sharp increase in Crowti ransomware infections during October is the latest indication that spam emails are still effective, according to Microsoft.
Fraud Protection October 1, 2014 Fraud Risk Engines: The Statistics Are Not in Your Favor 4 min read - The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Endpoint September 29, 2014 Corporate Credentials Protection: Do You Know Where Your Passwords Are? 3 min read - Protecting corporate credentials is becoming increasingly important as more high-profile breaches have compromised hundreds of millions of user accounts.
Fraud Protection September 3, 2014 How Cybercriminals Monetize Information Obtained From Social Networks 6 min read - As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
September 3, 2014 No Shock: ALS Ice Bucket Challenge Spawns Phishing Scams 3 min read - With the overwhelming popularity of the ALS Ice Bucket Challenge, it is no surprise that scammers are using the effort to steal information and money.
Banking & Finance August 29, 2014 Russian Email Data Breach: Top Ways the Data Could Be Used 4 min read - In the wake of a reported data breach by hackers in Russia, individuals and companies should be on the lookout for these types of malicious attacks.
Fraud Protection April 1, 2014 The Next Evolution of Spam: Spam Is Not Dead 2 min read - After a new fraud-as-a-service capability was introduced in an online cyber crime community, it became clear that fraudsters are still interested in spam.
Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.