Similar Articles |
|
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
InternetNews September 30, 2010 |
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. |
InternetNews June 29, 2007 Andy Patrizio |
Spammers Are Playing Your Boss For A Sucker Spammers now target C-level execs, figuring they won't know better. |
InternetNews July 27, 2004 Jim Wagner |
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. |
InternetNews January 27, 2010 |
Cyber Terrorists Target U.S. Oil Industry Three of the world's largest U.S.-based oil and natural gas companies were hoodwinked by an extremely sophisticated malware attack designed to steal key proprietary data related to the whereabouts of new oil reserves. |
BusinessWeek March 21, 2005 |
Israel Cracks Down On Dirty Money The largest money-laundering investigation in Israel's history continues to grow in scope. |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |
Commercial Investment Real Estate Jul/Aug 2008 |
International Report Tel Aviv Is Newest Real Estate Hot Spot... Most-Expensive Office Markets... First Industrial Goes Global... Czech Republic Retail Overview... Asia Pacific Key Performance Indicators... The Second Silicon Valley... |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |