February 20, 2015 IRS Warns Taxpayers of Spear Phishing Scam 2 min read - The IRS has warned that cybercriminals are using bogus emails and voicemail messages in a spear phishing scam to steal personal information at tax time.
January 29, 2015 Wire Payment Scam Uses Email, Phone Calls to Dupe Victims, Authorities Warn 2 min read - A wire payment scam that has surfaced in 45 countries and led to an estimated loss of $215 million so far has prompted warnings from the FBI and IC3.
January 28, 2015 FBI Warns Ransomware Issue Needs Widespread Public Attention 2 min read - The FBI says ransomware is targeting consumers and businesses and spreading via pop-up windows on websites instead of just email spam.
X-Force January 21, 2015 ‘Blackhat’: Hollywood’s Latest Take on Hacking 3 min read - "Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
Banking & Finance January 20, 2015 Is Financial Malware Breaking the Bank? 3 min read - Financial malware is on the rise, according to a new Trusteer study that takes a hard look at the life cycle of these fraudulent transactions.
Malware January 19, 2015 Do You Trust Your Browser? Fake Browser Fraud Schemes Discovered in Brazil 6 min read - IBM Trusteer recently uncovered a fake browser fraud scheme in Brazil that works to steal online banking credentials from unsuspecting victims.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
November 26, 2014 Hack-y Holidays? Phishing Scams and Malware on the Rise, Says US-CERT 2 min read - According to US-CERT, phishing scams and malware are on the rise during the holiday season, and consumers must keep an eye out for warning signs.
Fraud Protection September 30, 2014 How to Bypass Two-Factor Authentication (2FA) and What the Future Holds 3 min read - Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Fraud Protection September 3, 2014 How Cybercriminals Monetize Information Obtained From Social Networks 6 min read - As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.