| Similar Articles |
 |
Bank Systems & Technology September 30, 2009 Maria Bruno-Britz |
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data.  |
InternetNews July 30, 2007 Andy Patrizio |
From Russia With Larceny Latest malware kit can integrate itself into your browser to mimic your online banking site, and you'd never notice the change.  |
InternetNews October 29, 2009 |
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds.  |
InternetNews October 5, 2009 |
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S.  |
PC Magazine February 15, 2006 Robert Lemos |
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high.  |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information.  |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds.  |
InternetNews October 1, 2009 |
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009.  |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues.  |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher.  |
IEEE Spectrum July 2008 Mark Anderson |
Crimeware Pays Adware, phishing, and spam are a strange -- and big -- business  |
Bank Technology News November 2007 |
Four Step Hack Targets Banks A group of hackers, reputedly from the Russian UpLevel crew, have been aiming a hack at U.S. bank customers that requires a four-step process, according to security researchers at managed security service provider SecureWorks.  |
InternetNews October 31, 2008 Richard Adhikari |
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan.  |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it.  |
InternetNews August 4, 2006 Andy Patrizio |
Symantec Readies Phishing Protection Software Symantec said it's about to begin public beta testing for Norton Confidential, an online transaction security product that detects phishing and fraudulent Web sites.  |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth.  |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack.  |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards.  |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack.  |
InternetNews May 25, 2005 Tim Gray |
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users.  |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source.  |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat?  |
InternetNews June 17, 2009 Alex Goldman |
Hacked Government and Corporate PCs for Sale A new report from Finjan says that the latest criminal markets are more sophisticated than ever before.  |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000.  |
PC Magazine August 4, 2006 Neil J. Rubenking |
Norton Confidential Norton Confidential reveals fraud sites, securely stores security credentials, and kicks malware out of memory.  |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application.  |