"Protector Air has revolutionized the way banks are preventing cyber-attacks and fraud, as the only frictionless, unified solution that protects against both."read more about how protector Air can keep you secure
The Latest from our Blog
The Wall Street Journal reported in February that banks closed more than 1,700 branches across America between June 2016 and June 2017, the largest decline on record. According to the paper, a lot of these closures happened in big cities […]
Reading this piece of research earlier in the week served as a reminder of the primary vulnerability that banking malware exploits, human trust. It’s valuable, stuck deep down in the digital trenches, to occasionally pull your head up for the […]
Every company is a technology company, regardless of what product or service it provides. In this age of digital transformation no company can make, deliver or market its products efficiently without technology. Financial services organizations are not exempt – in order […]
Together, we learn from the past and then we adapt
Attacks against retailer
point-of-sale (pos) systems
In recent years, a number of large retailers have suered the compromise of customers credit card data from point-of-sale (PoS) systems. In 2013 and 2014, Target and Home Depot became two of the more high-profile victims of this type of breach. It is likely that both intrusions were the work of the same criminal group…
Internal Data Theft
at JP Morgan Chase
In July of 2014, J.P. Morgan Chase discovered a month-long breach of their corporate network that exposed personal information of about 76 million households and more than 7 million small businesses. Attackers leveraged their initial entry to eventually gain access to over 90 servers across the enterprise….
Keylogger Theft of Consumer
On December 26, 2014, a group of criminals claiming aliation with Anonymous released a file of more than 13,000 credentials for sites including Walmart, Amazon, Playstation Live, and Hulu Plus. These were clearly obtained from keylogging botnets and almost certainly represent only a portion of the credentials captured from the compromised computers as the attackers likely kept the higher-value data for themselves…
Demo Our Solutions Today!
Experience the simplicity of Trusted Knight's full suite of security solutions
Try our solutions for 14 days with no changes to existing applications, security tools or infrastructure.Questions?