Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
CISO September 27, 2013 6 Psychological Elements Behind Sophisticated Cyber Attacks 5 min read - Social media and phishing exploits are going to get more sophisticated. Cyber attackers are exploiting influence tactics to create trust and risk. A look behind six psychological elements behind sophisticated cyber attacks.
Data Protection July 3, 2013 FBI Warns of Increase in Spear-Phishing Attacks 2 min read - Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Data Protection May 22, 2013 Spear Phishing, News and Twitter Accounts: Why Corporate Credentials Must Be Protected 2 min read - After several prominent Twitter accounts were hacked by attackers, it is clear that corporate credentials need to be protected by stronger security tools.
Fraud Protection March 25, 2013 Fraud Prevention on Trial: Effectiveness vs. Convenience 2 min read - When it comes to online banking, what is considered a commercially reasonable means of fraud protection, and how effective are those means to begin with?
Banking & Finance February 7, 2013 Back to Basics: Malware Authors Downgrade Tactics to Stay Under the Radar 7 min read - Malware authors have created variants to monitor Web sessions between a customer and their bank in order to change data in real time and steal information.
Fraud Protection July 31, 2012 Banking Trojan Silently Hacks Into Enterprises 2 min read - Software firm Maplesoft recently incurred an email database breach. The attackers sent phishing emails containing the Zeus banking Trojan to customers.
Fraud Protection April 24, 2012 Catch Me if You Can 2012: Phishing and Malware Meet Check Fraud 2 min read - We recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to execute check fraud.
Fraud Protection April 15, 2012 Phishing for Security: Security Themed Phishing Emails 2 min read - Social engineering plays an extremely significant role in the success of phishing attacks. Users must be able to identify malicious messages.
Fraud Protection April 10, 2012 Zeus Targets Cloud Payroll Service to Siphon Money From Enterprises 3 min read - With critical business services migrating to the cloud, service providers and cloud payroll services have become a prime target for cyber criminals.