- Security Blog
- By Eduard Kovacs
- November 23rd, 2013
Trusteer Highlights 5 of the Most Dangerous Malware Trends of 2014 – Infographic
Old techniques will be used to evade new technologies
- Security
- By Eduard Kovacs
- September 3rd, 2013
IBM Completes Acquisition of IT Security Firm Trusteer
Some say IBM has paid over $800 million (€607 million) for the Israel-based company
- Security
- By Eduard Kovacs
- August 15th, 2013
IBM Acquires IT Security Solutions Provider Trusteer – Video
The financial terms of the deal have not been disclosed
- Security
- By Bogdan Popa
- December 6th, 2012
64-Bit Windows Malware to Take Off in 2013 – Security Company
Malware infections expected to develop 64-bit capabilities next year
- Security Blog
- By Eduard Kovacs
- December 6th, 2012
Trusteer Forecasts Malware Trends for 2013 – Infographic
A sum-up of the evolution of malicious elements for next year
- Security Blog
- By Eduard Kovacs
- August 18th, 2012
Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems
The company has established operations in Japan and has put an industry veteran in charge
- Security Blog
- By Eduard Kovacs
- July 3rd, 2012
Kaspersky and Trusteer Solutions Best Against Online Payment Threats
The products of 14 companies were put to the test
- Spam Reports
- By Eduard Kovacs
- April 16th, 2012
Security-Related Phishing Schemes Most Effective, Trusteer Experts Find
Researchers provide some great examples of successful phishing scams
- Interviews
- By Eduard Kovacs
- March 23rd, 2012
Softpedia Exclusive Interview: Trusteer Expert on Financial Malware
An interview with Oren Kedem, Director of Product Marketing for Trusteer
- Security
- By Eduard Kovacs
- March 8th, 2012
Trustwave to Acquire M86 Security, Financial Terms Undisclosed
Trustwave will gain M86's 25,000 customers from 93 countries
- Security
- By Lucian Constantin
- August 4th, 2010
Researchers Commandeer Large ZeuS 2-Based Botnet
Mostly UK users affected
- Advisories
- By Lucian Constantin
- January 15th, 2009
Browser Vulnerability Opens Door to New Phishing Techniques
The JavaScript engines of all major browsers are vulnerable