Similar Articles |
|
InternetNews October 29, 2009 |
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
InternetNews March 15, 2006 Sean Michael Kerner |
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author. |
InternetNews December 27, 2006 Andy Patrizio |
The Evolution Of Malware Continues Skype is the latest target of electronic thieves. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
InternetNews August 12, 2005 Tim Gray |
Attack Launches 19 Forms of Malware A highly complex Trojan was discovered on a U.S. site with a Russian-registered domain. |
InternetNews August 16, 2010 |
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. |
InternetNews December 10, 2009 |
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. |
Bank Systems & Technology July 28, 2006 Gregg Keizer |
Phishers Beat Citibank's Two-Factor Authentication Nearly three-dozen phishing Web sites have targeted Citibank business customers with a new scheme that circumvents two-factor authentication. |
InternetNews December 2, 2008 Sean Michael Kerner |
Apple Recommends Antivirus for Mac Users Apple quietly suggests customers use antivirus software, though threats are still few in number. |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... |
InternetNews June 3, 2005 Tim Gray |
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. |
InternetNews September 25, 2009 |
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. |
InternetNews August 6, 2004 Roy Mark |
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. |
Bank Systems & Technology February 22, 2007 Michael Singer |
To Keep Consumer Trust, Try Tokens and Smart Cards Banks and other financial institutions should adopt stronger authentication measures, such as security tokens and smart cards, if they want to increase customer satisfaction with Internet banking, according to a panel of industry analysts. |
InternetNews December 16, 2008 Richard Adhikari |
Several Attacks Behind CheckFree Data Breach The cybercriminals who breached the CheckFree bill paying service last week used a combination attack that may be almost impossible to stop. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
Bank Systems & Technology October 28, 2004 Ivan Schneider |
No Static at All One-time passwords mitigate online banking security risks. |
Bank Technology News August 2006 |
Sizing Up Security: Are U.S. Banks Trailing U.K. Banks? If best practices are indeed what the U.S. banking industry seeks with regard to online security, they'll likely find some of the answers across the pond. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
PC Magazine November 30, 2005 Jane Pinckard |
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat. |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
InternetNews February 23, 2007 Clint Boulton |
Want a Contract With Your Key Logger? Malware authors are now offering ongoing support and updates for their goods. |
InternetNews November 7, 2008 Richard Adhikari |
New Tools to Battle the Sinowal Trojan Antivirus vendor Authentium thinks it might have built a better mousetrap that will protect users against the Trojan also known as Torpig and Mebroot. |
InternetNews March 10, 2010 |
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. |
Bank Technology News April 2005 John Adams |
The Cost of Doing Business The debate over multi-factor authentication for electronic transactions is growing louder, and many say industry-wide use is virtually inevitable for banks. So why is almost nobody doing it? |
InternetNews November 20, 2009 |
Past Year's Malware Could Shape 2010's Threats Ever heard of Induc, Sninsfs or OSX.iservice? These new types of attacks emerged in 2009 and could become more prevalent in the year ahead. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews August 4, 2006 Andy Patrizio |
Symantec Readies Phishing Protection Software Symantec said it's about to begin public beta testing for Norton Confidential, an online transaction security product that detects phishing and fraudulent Web sites. |
InternetNews August 18, 2010 |
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. |
InternetNews October 5, 2009 |
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
PC World May 9, 2002 Brian Sullivan |
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... |
InternetNews May 19, 2009 |
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
InternetNews June 28, 2004 Ryan Naraine |
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
PC World December 31, 2007 Erik Larkin |
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. |
PC World August 23, 2002 Frank Thorsberg |
The World's Worst Viruses Check out our list of nasty computer viruses -- and find out how to save your PC from infection. |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware. |
Bank Systems & Technology September 30, 2009 Maria Bruno-Britz |
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data. |
PC World August 2004 Andrew Brandt |
Does Your Online Profile Say Something You Wouldn't? Sneaky hackers can put undesirable links and images into your personal profile page without your knowledge. |