| Similar Articles |
 |
InternetNews October 31, 2008 Richard Adhikari |
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan.  |
InternetNews October 5, 2009 |
RSA Claims New Trojan Plants False Bots Users of online banking may be at greater risk than they know if the URLZone Trojan attacks reach the U.S.  |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate.  |
InternetNews February 7, 2007 Ed Sutherland |
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers.  |
PC Magazine January 8, 2010 Neil J. Rubenking |
SafeCentral 2.6 SafeCentral 2.6 protects your sensitive financial transactions in a bulletproof secure browser, now with improved flexibility.  |
InternetNews December 2, 2008 Sean Michael Kerner |
Apple Recommends Antivirus for Mac Users Apple quietly suggests customers use antivirus software, though threats are still few in number.  |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher.  |
InternetNews May 5, 2009 Alex Goldman |
Researchers Seize Botnet, Peer Into Net's Dark Side For 10 days, a UCSB team monitored a botnet known for stealing credit card data and bank account credentials.  |
PC World January 28, 2002 Ellen Messmer |
'My Party' E-Mail Virus Hides as URL Antivirus vendors urge update to protect against sneaky virus, which could open PCs to intruders...  |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat?  |
InternetNews October 26, 2006 Ed Sutherland |
Vista's PatchGuard Bypassed? A security vendor announced it has found a way to bypass a controversial security measure in Microsoft's upcoming Vista operating system.  |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit...  |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information.  |
Bank Technology News November 2007 |
Four Step Hack Targets Banks A group of hackers, reputedly from the Russian UpLevel crew, have been aiming a hack at U.S. bank customers that requires a four-step process, according to security researchers at managed security service provider SecureWorks.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application.  |
InternetNews March 7, 2005 Sean Michael Kerner |
DNS-Based Phishing Attacks on The Rise Phishers are using a pair of DNS exploits to help give them the illusion of credible domains.  |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet...  |
InternetNews November 20, 2007 Sean Michael Kerner |
The Trouble With BIND DNS Servers New research shows that the open source BIND server still dominates, as do security issues.  |
InternetNews January 22, 2010 |
Has DNSSEC Been Compromised Again? Yet another flaw is found in technology aimed at fixing DNS's own flaws. Should we be worried?  |
IEEE Spectrum October 2008 David Schneider |
Fresh Phish How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites  |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it.  |