The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in…
Browsing CategoryTrusteer
A View Into Web(View) Attacks in Android
James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it…
New ZE Loader Targets Online Banking Users
IBM Trusteer closely follows developments in the financial cyber crime arena. Recently, we discovered a new remote overlay malware that is more persistent and more sophisticated than most current-day codes.…
Why Fraudsters Are Flying High on Airline Loyalty Programs
Loyalty and fraud. Not a nice pairing. Loyalty is great for business, fraud taxes it with ongoing losses. Yet the two have become inseparable in the past two decades, with…
How a Cunning Remote Overlay Malware Met Its Match
co-authored by Nadav Katzenell, Head of Machine Learning, Data & Research, IBM Trusteer This article explores how an aggressive and elusive remote overlay PC malware that is attacking Latin American…
How Fraud Specialist Danna Pelleg Fights Bad Guys With the Best Team in the Business
The security industry is fast-paced, no doubt about it. Those who are called to the profession must be quick-witted, focused, ready to change at any moment and maybe even a…
How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career
There’s no doubt that a cybersecurity breach can blow up a business, but it’s still surprising to hear Shaked Vax, worldwide technical sales leader at IBM Security, compare some aspects…
Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud
Consumers flock to opportunities for instant gratification. They want their coffee orders ready when they arrive, their purchases delivered today, their movies to play the instant the mood strikes. So,…
Why Limor Golan Works Hard to Make Security Operations Easier
If only we could all be as passionate as Limor Golan. The security software engineer loves her work so much that she’s sitting in her office at nine months pregnant.…
How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud
The journalist’s nose can be relied upon to sniff out a good story — but can it also sniff out identity fraud? Shir Levin thinks so. As a fraud analyst…