| Similar Articles |
 |
InternetNews November 7, 2008 Richard Adhikari |
New Tools to Battle the Sinowal Trojan Antivirus vendor Authentium thinks it might have built a better mousetrap that will protect users against the Trojan also known as Torpig and Mebroot.  |
InternetNews October 5, 2009 |
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S.  |
InternetNews May 19, 2009 |
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger.  |
Bank Systems & Technology September 30, 2009 Maria Bruno-Britz |
At Least One Part of the Economy is Growing: Cybercrime Several studies are showing growth in new techniques designed to trick users and even anti-virus programs to gain access to personal data.  |
InternetNews December 7, 2007 Andy Patrizio |
U.S. Lab Falls Victim to Phishing Attack Thieves stole 14 years of visitors' personal data in a sophisticated malware attack.  |
InternetNews January 10, 2008 Andy Patrizio |
New Rootkit Targets the Drive's MBR The bad guys got the idea from Black Hat and a security firm, illustrating the risks of bringing vulnerabilities to light.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
Bank Technology News November 2007 Yuval Ben-Itzhak |
The New Enemy: A Trojan Worse Than Phishing Finjan's Malicious Code Research Center discovered evidence of a new genre of crimeware Trojan that steals bank customers' identities without so much as leaving a trace.  |
PC Magazine February 15, 2006 Robert Lemos |
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high.  |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes.  |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information.  |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins.  |
InternetNews November 5, 2008 Richard Adhikari |
Spammers Latch on to Obama Victory President-elect Barack Obama's campaign leveraged social networking all the way to victory in last night's election. But Obama's online presence has attracted some problems, too.  |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues.  |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate.  |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe.  |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher.  |
InternetNews May 25, 2005 Tim Gray |
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users.  |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever.  |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them.  |
InternetNews April 23, 2004 Ryan Naraine |
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked.  |
InternetNews May 17, 2004 Ryan Naraine |
Cisco Investigating Stolen Source Code A corporate network breach leads to leaked proprietary code, but confidential customer data and financial systems weren't compromised.  |
Bank Technology News November 2007 |
Four Step Hack Targets Banks A group of hackers, reputedly from the Russian UpLevel crew, have been aiming a hack at U.S. bank customers that requires a four-step process, according to security researchers at managed security service provider SecureWorks.  |
InternetNews December 19, 2007 |
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider.  |
PC World October 23, 2002 Paul Roberts |
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say.  |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source.  |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it.  |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack.  |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems.  |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users.  |
InternetNews March 15, 2006 Sean Michael Kerner |
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author.  |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards.  |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack.  |
InternetNews August 11, 2010 |
SMS-Sending Trojan Hits Android Devices Security software firm Kaspersky Lab has detected a Trojan that hides itself in a media player application to send text messages to premium numbers and run up users' wireless service bills.  |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat?  |
Wall Street & Technology December 19, 2007 Melanie Rodier |
U.S. Banks Are Targets in 60 Percent of Worldwide Phishing Attacks Phishing attacks against global banking brands target U.S. institutions most, according to security solutions provider RSA.  |