Spam phishing and social engineering attacks
- March 26, 2012
Legal and technical actions could disrupt some Zeus botnet operations by seizing command-and-control servers in Pennsylvania and Illinois.
- September 20, 2010
Fraudsters are increasingly targeting bank customers via voice and text message phishing scams.
- July 14, 2010
Bank Trojan injects fake enrollment screens during online banking sessions to trick users into divulging sensitive data.
- June 23, 2010
RSA researchers say large U.S. banks experienced a surge in phishing attacks this spring.
- January 29, 2010
RSA researchers say emerging phone call fraud services make it easy for criminals to victimize banking customers
- December 08, 2009
This year saw the rise of sophisticated malware like the Zeus Trojan that hijacks online banking sessions and siphons money from accounts in real time
- December 03, 2009
Trusteer study shows that half of online banking customers who click on phishing emails divulge their login credentials
- November 24, 2009
Leader of pump-and-dump spam operation will serve more than four years in prison
- October 28, 2009
Company's proposed security measures after breach that exposed customers' personal data are insufficient, judge rules
- October 27, 2009
Emails try to trick users by pretending to be warnings from the FDIC about failed banks
- October 01, 2009
Prosecutors say phishing operation targeted multiple financial institutions
- September 08, 2009
Security experts say the customizable and readily available Zeus Trojan is stealing banking credentials to siphon money from accounts. The bank Trojan has advanced capabilities and can allow criminals to alter a form on a legitimate banking website ...
- July 20, 2009
Financial industry worried that ICANN plan could mislead consumers and lead to more cybersquatting and phishing attacks.
- June 30, 2009
MarkMonitor study shows rampant cybersquatting and phishing attacks against four top bank brands.
- June 11, 2009
Organizations aims to help financial-services firms fight phishing attacks with paper on deploying Sender Policy Framework and Domain Keys Identified Mail protocols.