Fraud Protection July 31, 2012 Banking Trojan Silently Hacks Into Enterprises 2 min read - Software firm Maplesoft recently incurred an email database breach. The attackers sent phishing emails containing the Zeus banking Trojan to customers.
Fraud Protection April 24, 2012 Catch Me if You Can 2012: Phishing and Malware Meet Check Fraud 2 min read - We recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to execute check fraud.
Fraud Protection April 15, 2012 Phishing for Security: Security Themed Phishing Emails 2 min read - Social engineering plays an extremely significant role in the success of phishing attacks. Users must be able to identify malicious messages.
Fraud Protection April 10, 2012 Zeus Targets Cloud Payroll Service to Siphon Money From Enterprises 3 min read - With critical business services migrating to the cloud, service providers and cloud payroll services have become a prime target for cyber criminals.
Malware February 28, 2012 Speaking With the Devil: Malware Adds Live Chat to Commit Fraud 2 min read - Certain banks are now confronting a new form of fraud. A piece of malware known as Shylock uses live chat to steal personal data from unsuspecting victims.
Malware February 8, 2012 Fraudsters Selling Login Credentials for Facebook, Twitter in Bulk 3 min read - Two cyber crime rings are selling login credentials in so-called "factory outlets" for social networking sites such as Facebook, Twitter and cPanel.
Advanced Threats April 13, 2011 RSA and Epsilon: Research Shows Education Can’t Protect Against New Social Engineering Attacks 4 min read - Even security-savvy users can fall for fake social engineering attacks through malicious emails sent by cyber criminals to install malware.
Endpoint January 4, 2011 Mobile Users 3 Times More Vulnerable to Phishing Attacks 4 min read - Mobile users are reportedly more likely to succumb to phishing attacks based on the manner in which they access certain websites.
Data Protection December 1, 2010 The Golden Hour of Phishing Emails 2 min read - Users who submit data to phishing emails can see the integrity of that information compromised by a fraudster within a 'goldern hour' of 60 minutes.
Data Protection November 9, 2010 Real-Time Phishing Takes Off 3 min read - The use of real-time phishing to bypass two-step authentication is on the rise, and online banking customers should be on guard.