MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
October 29, 2009
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. mark for My Articles similar articles
PC Magazine
June 20, 2007
Larry Seltzer
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. mark for My Articles similar articles
InternetNews
March 15, 2006
Sean Michael Kerner
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author. mark for My Articles similar articles
InternetNews
December 27, 2006
Andy Patrizio
The Evolution Of Malware Continues Skype is the latest target of electronic thieves. mark for My Articles similar articles
InternetNews
September 17, 2007
Andy Patrizio
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
InternetNews
August 12, 2005
Tim Gray
Attack Launches 19 Forms of Malware A highly complex Trojan was discovered on a U.S. site with a Russian-registered domain. mark for My Articles similar articles
InternetNews
August 16, 2010
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles
Bank Systems & Technology
July 28, 2006
Gregg Keizer
Phishers Beat Citibank's Two-Factor Authentication Nearly three-dozen phishing Web sites have targeted Citibank business customers with a new scheme that circumvents two-factor authentication. mark for My Articles similar articles
InternetNews
December 2, 2008
Sean Michael Kerner
Apple Recommends Antivirus for Mac Users Apple quietly suggests customers use antivirus software, though threats are still few in number. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
InternetNews
August 28, 2009
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? mark for My Articles similar articles
InternetNews
June 23, 2006
Sean Michael Kerner
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. mark for My Articles similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles similar articles
InternetNews
September 25, 2009
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. mark for My Articles similar articles
InternetNews
August 6, 2004
Roy Mark
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. mark for My Articles similar articles
Bank Systems & Technology
February 22, 2007
Michael Singer
To Keep Consumer Trust, Try Tokens and Smart Cards Banks and other financial institutions should adopt stronger authentication measures, such as security tokens and smart cards, if they want to increase customer satisfaction with Internet banking, according to a panel of industry analysts. mark for My Articles similar articles
InternetNews
December 16, 2008
Richard Adhikari
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. mark for My Articles similar articles
InternetNews
February 24, 2009
Richard Adhikari
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
Bank Systems & Technology
October 28, 2004
Ivan Schneider
No Static at All One-time passwords mitigate online banking security risks. mark for My Articles similar articles
Bank Technology News
August 2006
Sizing Up Security: Are U.S. Banks Trailing U.K. Banks? If best practices are indeed what the U.S. banking industry seeks with regard to online security, they'll likely find some of the answers across the pond. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. mark for My Articles similar articles
PC Magazine
November 30, 2005
Jane Pinckard
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
InternetNews
February 23, 2007
Clint Boulton
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. mark for My Articles similar articles
InternetNews
November 7, 2008
Richard Adhikari
New Tools to Battle the Sinowal Trojan Antivirus vendor Authentium thinks it might have built a better mousetrap that will protect users against the Trojan also known as Torpig and Mebroot. mark for My Articles similar articles
InternetNews
March 10, 2010
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. mark for My Articles similar articles
Bank Technology News
April 2005
John Adams
The Cost of Doing Business The debate over multi-factor authentication for electronic transactions is growing louder, and many say industry-wide use is virtually inevitable for banks. So why is almost nobody doing it? mark for My Articles similar articles
InternetNews
November 20, 2009
Past Year's Malware Could Shape 2010's Threats Ever heard of Induc, Sninsfs or OSX.iservice? These new types of attacks emerged in 2009 and could become more prevalent in the year ahead. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
August 4, 2006
Andy Patrizio
Symantec Readies Phishing Protection Software Symantec said it's about to begin public beta testing for Norton Confidential, an online transaction security product that detects phishing and fraudulent Web sites. mark for My Articles similar articles
InternetNews
August 18, 2010
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. mark for My Articles similar articles
InternetNews
October 5, 2009
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
PC World
May 9, 2002
Brian Sullivan
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... mark for My Articles similar articles
InternetNews
May 19, 2009
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. mark for My Articles similar articles
InternetNews
July 28, 2004
Ryan Naraine
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. mark for My Articles similar articles
InternetNews
June 28, 2004
Ryan Naraine
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. mark for My Articles similar articles
InternetNews
September 7, 2006
Ed Sutherland
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. mark for My Articles similar articles
InternetNews
December 30, 2004
Tim Gray
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. mark for My Articles similar articles
PC World
December 31, 2007
Erik Larkin
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. mark for My Articles similar articles
PC World
August 23, 2002
Frank Thorsberg
The World's Worst Viruses Check out our list of nasty computer viruses -- and find out how to save your PC from infection. mark for My Articles similar articles
InternetNews
April 27, 2005
Tim Gray
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. mark for My Articles similar articles
Bank Systems & Technology
September 30, 2009
Maria Bruno-Britz
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. mark for My Articles similar articles
PC World
August 2004
Andrew Brandt
Does Your Online Profile Say Something You Wouldn't? Sneaky hackers can put undesirable links and images into your personal profile page without your knowledge. mark for My Articles similar articles