Similar Articles |
|
PC World December 31, 2007 Erik Larkin |
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. |
InternetNews February 11, 2009 Richard Adhikari |
Spammers Hijack Facebook Group of 1.5 Million Facebook site is taken over by get-rich-quick and other familiar spam. |
InternetNews March 3, 2009 Richard Adhikari |
Digg Hackers Strike Next at YouTube Attacks are on the rise, with malware authors dabbling in spreading worms and scareware via comments. |
InternetNews July 21, 2009 Alex Goldman |
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. |
PC World August 2004 Andrew Brandt |
Does Your Online Profile Say Something You Wouldn't? Sneaky hackers can put undesirable links and images into your personal profile page without your knowledge. |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. |
InternetNews January 6, 2009 Richard Adhikari |
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews July 6, 2006 Sean Michael Kerner |
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. |
InternetNews March 10, 2010 |
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. |
InternetNews August 18, 2010 |
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
InternetNews June 10, 2005 Tim Gray |
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself. |
InternetNews January 22, 2009 Richard Adhikari |
Spammers Are Gaming Google's Adwords Researchers are warning of some bad actors in paid results on Google. |
InternetNews January 4, 2007 Ed Sutherland |
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. |
InternetNews February 15, 2008 Andy Patrizio |
Malware Threatens Mac Users: Report Survey shows Apple users expect the bad guys to follow them, but the good news is the evildoers are looking the other way. |
InternetNews May 13, 2010 |
One Gang Responsible For Most Phishing Attacks More than two-thirds of all phishing attacks in the second half of 2009 were the work of one gang, according to an anti-phishing group. |
InternetNews January 19, 2009 Richard Adhikari |
Get Ready for Inauguration Spam As Obama prepares to be sworn in, hackers and spammers are gearing up for a field day. |
InternetNews January 18, 2011 |
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. |
InternetNews April 11, 2008 Susan Kuchinskas |
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. |
InternetNews April 14, 2009 Alex Goldman |
Credit Cards, Banks Targeted by Cyber Criminals Sophisticated criminal gangs are organized and focused on stealing, buying and selling identities across shadowy online markets. |
InternetNews March 3, 2005 Sean Michael Kerner |
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
InternetNews September 2, 2009 |
Malware Capitalizes on California Wildfires Macs and PCs are under attack as concerned netizens search for information about the fires. |
InternetNews January 14, 2009 Judy Mottl |
More Adults Jump Into Social Networking But the trend remains dominated by teenagers. |
InternetNews January 28, 2009 Richard Adhikari |
Online Trust: A Thing of the Past? Malware attacks are turning the Web upside down, and complicating the efforts of security vendors and users to cope with the threats. |
InternetNews September 16, 2009 Larry Barrett |
Hackers Targeting Web 2.0 Sites at Alarming Rate Security software vendor Websense claims 95 percent of user-generated comments on blogs and message boards are either spam or contain malicious code. |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. |
InternetNews January 25, 2011 |
ICQ Users Fend Off Fake AV Campaign A new scareware scam is taking flight on ICQ, attempting to infect users' PCs and mobile devices while selling them a bill of goods. |
InternetNews June 20, 2007 Susan Kuchinskas |
Malware on The Tube The newest wave of Trojans is coming to you on YouTube - and other Web sites. |
InternetNews February 3, 2006 Catherine Pickavet |
Balancing The Business of MySpace Are social networking sites like MySpace in need of more supervision? |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. |
InternetNews December 2, 2010 |
Targeted Malware, Spam Will Surge in '11 Security software vendor predicts more malware campaigns will use social media to target mobile devices, apps and industry-specific systems. |
InternetNews April 8, 2008 Andy Patrizio |
Malware Problem Shows no Sign of Slowing It's easier than ever to write a phishing virus that looks like a Facebook app thanks to virus writer's toolkits, Symantec finds. |
InternetNews February 23, 2009 Richard Adhikari |
Malware Authors Exploit Facebook App Is a bogus application making the rounds on Facebook just a failed marketing ploy? Or something more dangerous? |
InternetNews January 30, 2008 Andy Patrizio |
Storm's Creators Face a Storm of Their Own Law enforcement knows who created one of the worst worms to hit the Internet. The hard part is arresting them. |
InternetNews December 5, 2006 Ed Sutherland |
MySpace Hit by QuickTime Worm Hackers attempted to steal the user data of MySpace visitors using an Apple QuickTime video and a vulnerability in the social-networking site. |
InternetNews April 2, 2010 |
Report Tracks the Latest Trends in Cybercrime Sophisticated campaign tracking and dramatically increased use of social networking technologies were two of the top trends in cybercrime in 2009. |
InternetNews June 29, 2009 Alex Goldman |
Michael Jackson Malware Has Already Hit the Net Trojans attempt to exploit the postmortem interest around the late King of Pop. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews February 24, 2009 Richard Adhikari |
Supertoxic Site Infects eWeek.com Hackers attacked news site eWeek through DoubleClick network. |
Fast Company Neal Ungerleider |
YouTube: Users Are More Likely To View Ads On Mobile A new survey released today by YouTube and consulting firm Ipsos MediaCT says mobile users are 1.4 times more likely to share ads. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
InternetNews June 2, 2010 |
Facebook Users Fend Off 'Likejacking' Attacks Hackers looking to take over Web sessions via Facebook are hiding malware under click-inducing, socially engineered links. |
InternetNews September 30, 2010 |
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. |
InternetNews June 2, 2010 |
Blackhat SEO Scam Hits Mop.com Gaming Site One of the world's most popular online gaming sites is under siege from a creative malware scam that attempts to swindle players' personal information and gaming credits. |
InternetNews January 20, 2011 |
New Worm Takes Twitter Users For a Ride Twitter fans have a new malware campaign to worry about this week after security researchers at Kaspersky Lab identified a new scareware come-on. |
PC World January 28, 2008 Erik Larkin |
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. |