Similar Articles |
|
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
InternetNews February 26, 2004 Sean Michael Kerner |
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. |
InternetNews January 24, 2006 Sean Michael Kerner |
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. |
Popular Mechanics April 17, 2008 Joe Pappalardo |
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. |
InternetNews January 9, 2004 Sean Michael Kerner |
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from [email protected] to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan. |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. |
InternetNews September 22, 2005 David Needle |
Beware, Bagle is Back Several anti-virus security sites have issued warnings that a variant of the infamous Bagle worm has shown up on the Internet, spreading via e-mails... Symantec agrees to acquire WholeSecurity... |
InternetNews February 15, 2007 Andy Patrizio |
Another Week, Another MS Word Exploit Emerges Microsoft is investigating new public reports of "very limited, targeted attacks" against Microsoft Word. |
InternetNews July 27, 2004 Jim Wagner |
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
InternetNews March 1, 2005 Jim Wagner |
Fresh Bagle Attacks Under Way A wave of Bagle variants is slipping past anti-virus software and into computers. |
InternetNews February 25, 2005 Sean Michael Kerner |
Phishing Attacks Jump 42 Percent An anti-phishing group says scam e-mails that seek users' personal information increased sharply last month. The types of attacks are also expanding. The United States had the most phishing sites, with China and South Korea placing second and third, respectively. |
InternetNews April 22, 2004 Sean Michael Kerner |
Who's Taking the Bait: 'Phishing' Skyrockets Online security groups say the scamming technique used for identity theft is proliferating as fast as viruses, with attacks up over a thousand percent since September. |
PC Magazine April 5, 2006 Robert Lemos |
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |
InternetNews October 31, 2005 Jim Wagner |
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. |
InternetNews May 25, 2005 Tim Gray |
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users. |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
InternetNews March 11, 2008 David Needle |
Microsoft Targets Office Remote Execution Flaws Latest "Patch Tuesday" updates aim to shut the door on a slew of critical Office suite vulnerabilities. |
InternetNews August 6, 2004 Roy Mark |
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
InternetNews April 28, 2004 Ryan Naraine |
Blaster Redux? SSL Worm Threat Rising Security experts have spotted the first signs of a Blaster-like worm circulating underground, prompting fears that major Internet disruptions could be less than a week away. |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
InternetNews June 10, 2005 Tim Gray |
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews March 8, 2010 |
CERT Warns of Energizer DUO Trojan U.S. Computer Emergency Readiness Team issues warning that software associated with Energizer DUO USB battery charger contains a Trojan that makes users' PC susceptible to hackers. |
PC World December 11, 2000 Sean Captain |
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. |
InternetNews August 26, 2004 Ryan Naraine |
How Not to Get 'Phished' The FTC releases a helpful guide to avoid the lure of phishers, who attempt to steal your identity online. |
InternetNews January 10, 2008 Andy Patrizio |
First iPhone Malware Found The US Computer Emergency Response Team has issued a warning that a fraudulent iPhone upgrade is making its way around the Internet and users should not be fooled into installing it. |
InternetNews April 1, 2004 Sharon Gaudin |
Study: Virus Attacks Up But Infections Hold Steady Last year more -- and more dangerous -- viruses raced across the Internet than ever, according to a new study. But there was a glimmer of good news. |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Bank Systems & Technology July 5, 2004 Peggy Bresnick Kendler |
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. |
T.H.E. Journal April 2004 Judith Rajala |
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. |
InternetNews March 31, 2005 Tim Gray |
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. |
InternetNews April 13, 2004 Sharon Gaudin |
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. |
InternetNews January 14, 2004 Sharon Gaudin |
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. |
PC Magazine March 6, 2007 |
No Peeking at Suspect E-Mail Don't peek at the pictures in spam e-mails. If you look, you're potentially giving personal information to the sender and, of course, inviting more spam. |
InternetNews March 19, 2004 Ryan Naraine |
It is Time for Some 'Friendly' Worms Let's face it folks, the virus writers have the upper hand these days. Is it time for the industry to be bold and imaginative about fighting back? |
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews June 13, 2005 Tim Gray |
New Trojan Pretends to be Antivirus Software Anti-virus maker F-Secure warned mobile phone users about a slippery new trojan disguising itself as an antivirus application. |
InternetNews May 28, 2009 Alex Goldman |
Small Businesses Under Siege by Spammers Real-world data compiled shows that money scams are growing as the recession continues - and small firms aren't exempt. |
InternetNews April 23, 2004 Ryan Naraine |
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. |