CYBERCRIME.ORG. Cybercrime as a Business

Cybercrime seems very recent and modern, but at the dizzying pace everything happens today, this is a phenomenon that has already gone through several stages of ...
READ MORE

FinTechs are also on the malware radar

For years we have witnessed the pace at which technology advances. This progress not only generates business opportunities for multinational companies with soaring ...
READ MORE

Analyzing a Biometric Banking Malware: Camubot

We know that today there is malware related to all kinds of malicious activities. This includes banking malware, which is designed to rob banking credentials. This type ...
READ MORE

Safeguard your company by avoiding these common email scams

Email and other internet scams have become so widespread that just about anyone could be a target. However, being in the banking and finance sector may put your business ...
READ MORE

Subliminal messages. The phishing of the future.

Phishing is considered one of the most prolific cybercrimes affecting individuals, companies and large institutions. Basically, it consists of supplanting the identity ...
READ MORE

Analyzing the risk of banking malware in Android vs. iOS

It is common nowadays to hear news about new families of banking malware for Android devices and how they work. However, the same cannot be said for iOS devices. This ...
READ MORE

Criminal appeal and secure virtual behavior

In 1979, Cohen and Felson presented a new approach in criminology theories. Until then, these theories had been quite focused on the criminal – on their genesis and ...
READ MORE

Overlays: The preferred technique for bankers in Android

Nine years have passed since the first banking malware for Android mobile devices was discovered. It was 2010, and just a year and a half had passed since the launch of ...
READ MORE

The future of infections: Autonomous malware

IBM presented the results of an innovative new project exploring the future of malware during the Black Hat USA cybersecurity conference in August 2018.
READ MORE

Brain hacking II: Getting over the firewall

It’s 10:30 in the morning and Carmen enters the bar punctually to have breakfast, as she does every day. It’s like the movie Groundhog Day: she sits down in the same ...
READ MORE