IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms

IBM Security Trusteer’s mobile security research team has recently discovered a major mobile banking fraud operation that managed to steal millions of dollars from financial institutions in Europe and the US within a matter of days in each attack before being intercepted and halted. This is the work of a professional and organized gang that […]

The post IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms appeared first on Security Intelligence.

Continue reading IBM Trusteer Exposes Massive Fraud Operation Facilitated by Evil Mobile Emulator Farms

New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks

IBM Security Trusteer researchers have discovered a new malware code and active campaign targeting online banking users in Brazil. The malware, coined “Vizom” by the team, uses familiar remote overlay attack tactics to take over user devices in real time, as the intended victim logs in, and then initiates fraudulent transactions from their bank account. […]

The post New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks appeared first on Security Intelligence.

Continue reading New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions.  The Mergers and Acquisitions […]

The post Taking the Risk Out of Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Taking the Risk Out of Mergers and Acquisitions

Mitigating Containers Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliver more power […]

The post Mitigating Containers Risk Requires a Comprehensive Approach appeared first on Security Intelligence.

Continue reading Mitigating Containers Risk Requires a Comprehensive Approach

The Security Risks of Contactless Payment

Contactless payment first arrived in the 1990s and is now having its moment. Both companies and consumers are looking for ways to conduct business with as little physical interaction as possible during in-person transactions. We’ve been building to this moment, if you think about it. Organizations have been steadily increasing reliance on digital options and […]

The post The Security Risks of Contactless Payment appeared first on Security Intelligence.

Continue reading The Security Risks of Contactless Payment

Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey

The Ginp mobile banking malware, which emerged in late 2019, is one of the top most prevalent Android banking malware families today. It started as a simple short message server (SMS) stealer and rapidly evolved into one of the most advanced actors in the financial fraud landscape. Ginp has primarily targeted Spanish banks, but recent evidence […]

The post Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey appeared first on Security Intelligence.

Continue reading Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey

Should Organizations Be Operating Outside of Their Risk Appetite?

Organizations should know where to draw what may be a new line in their risk appetite, so they can weigh the amount of risk they are willing to take in the pursuit of their business objectives.

The post Should Organizations Be Operating Outside of Their Risk Appetite? appeared first on Security Intelligence.

Continue reading Should Organizations Be Operating Outside of Their Risk Appetite?

New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Since March 11, IBM X-Force has observed a more than 6,000 percent increase in COVID-19 spam, with lures ranging the full gamut of challenges and concerns facing individuals.

The post New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam appeared first on Security Intelligence.

Continue reading New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil

Recent CamuBot activity resurfaced exactly one year after IBM X-Force researchers made the initial discovery of this malware in September 2018.

The post CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil appeared first on Security Intelligence.

Continue reading CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil

What Are the Risks of the IoT in Financial Services?

The nature of financial business means that both the promise and the risks of the IoT in financial services are great.

The post What Are the Risks of the IoT in Financial Services? appeared first on Security Intelligence.

Continue reading What Are the Risks of the IoT in Financial Services?