Tag: Trusteer

Pharming Attacks Target Small Offices, Home Offices

Increasingly, cyber criminals are leveraging pharming attacks against a new channel: Small offices and home offices. In this method, malware is loaded to the router and automatically changes the router DNS settings to malicious Web addresses for...

Underground Cybercrime: Exploits for Sale

Trusteer's security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that, according to the seller, is successful 95 percent of the time.

Financial Institutions Are a Top Target for Malware Attacks

The direct correlation of the breach of half a billion records of personally identifiable information (PII) to the bottom line profit margin has not been lost on the Financial Sector. As financial services CEOs and board executives are asking their...

IBM to Acquire Fiberlink: What It Means for Mobile Security

IBM has announced our intent to acquire Fiberlink. Fiberlink's MaaS360 enterprise mobility management (EAM) platform delivers leading mobile management and security capabilities from the cloud. Mobile management, when taken in combination with...

Four Essential Layers to Protect Against Advanced Threats

IBM's strategy around advanced threat protection and how the recent Trusteer acquisition adds a critical component for approaching the challenges associated with more sophisticated attackers and the designer malware they frequently employ during...

IBM Announces Intention to Acquire Trusteer

Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...