| Similar Articles |
 |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts.  |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
InternetNews June 3, 2005 Tim Gray |
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs.  |
Bank Technology News November 2007 Yuval Ben-Itzhak |
The New Enemy: A Trojan Worse Than Phishing Finjan's Malicious Code Research Center discovered evidence of a new genre of crimeware Trojan that steals bank customers' identities without so much as leaving a trace.  |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack.  |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice.  |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat?  |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher.  |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information.  |
InternetNews August 11, 2010 |
SMS-Sending Trojan Hits Android Devices Security software firm Kaspersky Lab has detected a Trojan that hides itself in a media player application to send text messages to premium numbers and run up users' wireless service bills.  |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information.  |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems.  |
InternetNews May 25, 2005 Tim Gray |
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users.  |
InternetNews June 10, 2005 Tim Gray |
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself.  |
InternetNews September 30, 2010 |
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks.  |
InternetNews August 16, 2010 |
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file.  |
Bank Systems & Technology September 30, 2009 Maria Bruno-Britz |
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data.  |
InternetNews April 23, 2004 Ryan Naraine |
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked.  |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate.  |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes.  |
PC World December 31, 2007 Erik Larkin |
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs.  |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies.  |
InternetNews October 29, 2009 |
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds.  |
InternetNews June 28, 2004 Ryan Naraine |
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched.  |
The Motley Fool June 28, 2004 Alyce Lomax |
No Summer Break for Virus Writers A new development in virus evolution reared its ugly head last week with hackers planting malicious code into the Web servers for several reportedly popular sites.  |
InternetNews October 6, 2010 |
Zeus Phishing Scam Targets iTunes Users In a scam likely stemming from Eastern Europe, hackers are targeting visitors to Apple's iTunes music store with an unsolicited email directing them to sites carrying the Zeus Trojan malware.  |
InternetNews September 23, 2009 |
Do Not Pass Go: Malware Taps Phony 'Monopoly' Unsolicited invitation to play an online version of the popular board game can turn your computer into a spam-spewing zombie.  |
InternetNews October 31, 2008 Richard Adhikari |
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan.  |
InternetNews May 19, 2009 |
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger.  |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it.  |
Bank Technology News January 2011 Rebecca Sausner |
New Year, New Hacks? The new year is likely to bring more of the same when it comes to criminals siphoning funds from consumers and banks.  |
The Motley Fool October 25, 2006 Rick Aristotle Munarriz |
The Hacker Made Me Do It Investors: Psst! Your brokerage account is showing. Hackers are crafty. They'll always find a game to play. Just make sure to stay on your toes. Check your account often from a secure location -- or, better yet, have trade confirmations emailed to you.  |
InternetNews March 15, 2006 Sean Michael Kerner |
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author.  |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever.  |
InternetNews March 8, 2010 |
CERT Warns of Energizer DUO Trojan U.S. Computer Emergency Readiness Team issues warning that software associated with Energizer DUO USB battery charger contains a Trojan that makes users' PC susceptible to hackers.  |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack.  |
InternetNews November 7, 2008 Richard Adhikari |
New Tools to Battle the Sinowal Trojan Antivirus vendor Authentium thinks it might have built a better mousetrap that will protect users against the Trojan also known as Torpig and Mebroot.  |
InternetNews May 26, 2006 Ed Sutherland |
Microsoft Tells Word Users to Play it 'Safe' Rebounding from recent reports that China hackers are exploiting a zero-day vulnerability in Word to launch a Trojan horse, Microsoft is advising users to run the application in "safe mode."  |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services.  |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data.  |
PC Magazine February 15, 2006 Robert Lemos |
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high.  |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins.  |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them...  |
InternetNews August 18, 2010 |
Facebook Kit Makes Hacking Logins Easy Security software vendor BitDefender says it's found a new malware kit that lets hackers easily access logins and passwords for Facebook and other unsecured credentials.  |
InternetNews October 14, 2004 Sean Michael Kerner |
Microsoft Releases Scanning Tool As part of Microsoft's update package released this week, the company included the MS04-028 Enterprise Scanning Tool which allows system admins to scan their networks to identify potentially vulnerable machines.  |
PC Magazine November 30, 2005 Jane Pinckard |
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat.  |
InternetNews December 10, 2009 |
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started.  |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after...  |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe.  |