Similar Articles |
|
InternetNews October 31, 2008 Richard Adhikari |
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan. |
InternetNews October 5, 2009 |
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S. |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. |
InternetNews February 7, 2007 Ed Sutherland |
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. |
PC Magazine January 8, 2010 Neil J. Rubenking |
SafeCentral 2.6 SafeCentral 2.6 protects your sensitive financial transactions in a bulletproof secure browser, now with improved flexibility. |
InternetNews December 2, 2008 Sean Michael Kerner |
Apple Recommends Antivirus for Mac Users Apple quietly suggests customers use antivirus software, though threats are still few in number. |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. |
InternetNews May 5, 2009 Alex Goldman |
Researchers Seize Botnet, Peer Into Net's Dark Side For 10 days, a UCSB team monitored a botnet known for stealing credit card data and bank account credentials. |
PC World January 28, 2002 Ellen Messmer |
'My Party' E-Mail Virus Hides as URL Antivirus vendors urge update to protect against sneaky virus, which could open PCs to intruders... |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? |
InternetNews October 26, 2006 Ed Sutherland |
Vista's PatchGuard Bypassed? A security vendor announced it has found a way to bypass a controversial security measure in Microsoft's upcoming Vista operating system. |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
Bank Technology News November 2007 |
Four Step Hack Targets Banks A group of hackers, reputedly from the Russian UpLevel crew, have been aiming a hack at U.S. bank customers that requires a four-step process, according to security researchers at managed security service provider SecureWorks. |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. |
InternetNews March 7, 2005 Sean Michael Kerner |
DNS-Based Phishing Attacks on The Rise Phishers are using a pair of DNS exploits to help give them the illusion of credible domains. |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... |
InternetNews November 20, 2007 Sean Michael Kerner |
The Trouble With BIND DNS Servers New research shows that the open source BIND server still dominates, as do security issues. |
InternetNews January 22, 2010 |
Has DNSSEC Been Compromised Again? Yet another flaw is found in technology aimed at fixing DNS's own flaws. Should we be worried? |
IEEE Spectrum October 2008 David Schneider |
Fresh Phish How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |