Trusteer Highlights 5 of the Most Dangerous Malware Trends of 2014 – Infographic

Trusteer Highlights 5 of the Most Dangerous Malware Trends of 2014 – Infographic

Old techniques will be used to evade new technologies

IBM Completes Acquisition of IT Security Firm Trusteer

IBM Completes Acquisition of IT Security Firm Trusteer

Some say IBM has paid over $800 million (€607 million) for the Israel-based company

IBM Acquires IT Security Solutions Provider Trusteer – Video

IBM Acquires IT Security Solutions Provider Trusteer – Video

The financial terms of the deal have not been disclosed

64-Bit Windows Malware to Take Off in 2013 – Security Company

64-Bit Windows Malware to Take Off in 2013 – Security Company

Malware infections expected to develop 64-bit capabilities next year

Trusteer Forecasts Malware Trends for 2013 – Infographic

Trusteer Forecasts Malware Trends for 2013 – Infographic

A sum-up of the evolution of malicious elements for next year

Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems

Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems

The company has established operations in Japan and has put an industry veteran in charge

Kaspersky and Trusteer Solutions Best Against Online Payment Threats

Kaspersky and Trusteer Solutions Best Against Online Payment Threats

The products of 14 companies were put to the test

Security-Related Phishing Schemes Most Effective, Trusteer Experts Find

Security-Related Phishing Schemes Most Effective, Trusteer Experts Find

Researchers provide some great examples of successful phishing scams

Softpedia Exclusive Interview: Trusteer Expert on Financial Malware

Softpedia Exclusive Interview: Trusteer Expert on Financial Malware

An interview with Oren Kedem, Director of Product Marketing for Trusteer

Trustwave to Acquire M86 Security, Financial Terms Undisclosed

Trustwave to Acquire M86 Security, Financial Terms Undisclosed

Trustwave will gain M86's 25,000 customers from 93 countries

  • Security
  • By Lucian Constantin
  • February 22nd, 2011
New Session-Stealing Banking Trojan Identified

New Session-Stealing Banking Trojan Identified

  • Security
  • By Lucian Constantin
  • January 5th, 2011
Mobile Users More Susceptible to Phishing

Mobile Users More Susceptible to Phishing

  • Security
  • By Lucian Constantin
  • August 4th, 2010
Researchers Commandeer Large ZeuS 2-Based Botnet

Researchers Commandeer Large ZeuS 2-Based Botnet

Mostly UK users affected

Browser Vulnerability Opens Door to New Phishing Techniques

Browser Vulnerability Opens Door to New Phishing Techniques

The JavaScript engines of all major browsers are vulnerable