Webinars
November 30, 2015
Dyre and similar Trojans such as Neverquest and Dridex emerge as a new class of advanced, persistent cybercrime attack. They spread fast, hit hard, and are a devil to detect.
The operators of these Trojans use a clever combination of RitB techniques to conduct a sustained, multi-phased campaign in which - similar to APTs hitting the enterprise - they slowly manipulate victim accounts until they are ready to strike. At that time they deploy a standard Remote Access protocol (VNC) which makesthem completely invisible to device recognition and geo-location tools. They switch off all active components of the malware to make sure it cannot be detected by traditional anti-malware tools. Then they open a browser from within the genuine victim machine, log into online banking and proceed uninterrupted to empty the victim's account.
It's time to put up a good fight.
March 30, 2015
Banks and ecommerce sites allow users to open a new account online by providing personal information, such as address, email and SSN. Cyber-criminals use personal data, stolen through malware or phishing attacks, to impersonate the genuine users and open an account in their name. Later, these accounts are used to perpetrate fraud through money transfers and online purchasing of goods and services. BioCatch tracks how users behavior online while opening a new account. By analyzing user interaction BioCatch can identify and alert on behaviors that are consistent with criminal activities.
December 15, 2014
Corporate Banking is at the front of a high-pace battle between adaptive cybercriminals and bank fraud and eCrime teams determined to protect their business user base. Stakes are high, and each fraud case can amount to tens or hundreds of thousands of dollars. The already-high defences - 2FA, transaction signing, smart cards - force the fraud ecosystem to reach new heights of ingenuity. Which means they tap their best talent, their most professional malware authors, and their most creative social engineering experts, in order to stay ahead in the eternal race.
September 18, 2014
Enterprises and banks today understand that current security measures are inefficient and costly when it comes to mobile security. New threats are arising constantly and companies are in constant need for new effective solutions that will protect the end users without affecting their experience
June 9, 2014