| Similar Articles |
 |
InternetNews June 3, 2005 Tim Gray |
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs.  |
InternetNews December 19, 2007 |
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider.  |
PC World January 28, 2002 Ellen Messmer |
'My Party' E-Mail Virus Hides as URL Antivirus vendors urge update to protect against sneaky virus, which could open PCs to intruders...  |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit...  |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet...  |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure?  |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application.  |
InternetNews September 15, 2009 |
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware.  |
InternetNews April 27, 2005 Tim Gray |
Google Typo Crashes Systems Spyware authors and phishing fraudsters have taken advantage of misspellings of google.com to infect computers with trojans and adware.  |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it.  |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe.  |
PC Magazine November 30, 2005 Jane Pinckard |
Trojan Invades PSPs In early October, Symantec Security Response experts identified Trojan.PSPBrick, the first Trojan horse that targets Sony PlayStation Portable systems, as a Category 1 threat.  |
PC World November 26, 2001 Sam Costello |
Antivirus Vendors Warn of Badtrans Worm Patch available for Outlook flaw that allows worm to propagate...  |
PC World October 2001 Ramon G. McLeod |
Play CD-ROMs Without Using a Drive Farstone Technology's Virtual Drive 6.1 CD emulator speeds game play...  |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate.  |
InternetNews July 27, 2004 Jim Wagner |
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool.  |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack.  |
PC World July 2001 |
Letters to PC World Your take on sharing music files, Trojan horses, and online safety...  |
InternetNews September 29, 2004 Ryan Naraine |
Large Scale IM Virus Attack Feared The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed.  |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues.  |
InternetNews January 9, 2004 Sean Michael Kerner |
Fake Microsoft Service Pack is Xombe Trojan Another day, another virus. Unsuspecting Internet users were greeted Friday with an e-mail message purportedly from windowsupdate@microsoft.com to update their computers. Problem is, the message isn't from Microsoft and the patch is actually a back door Trojan.  |
InternetNews June 13, 2005 Tim Gray |
New Trojan Pretends to be Antivirus Software Anti-virus maker F-Secure warned mobile phone users about a slippery new trojan disguising itself as an antivirus application.  |
InternetNews March 15, 2006 Sean Michael Kerner |
New Trojan is Holding Data Ransom If you're the unlucky victim of the new cryzip Trojan making the rounds, it'll cost you $300 to get your data back from the Trojan's author.  |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat?  |
PC Magazine August 17, 2004 Neil J. Rubenking |
ShadowUser Pro 2.0 ShadowUser Pro 2.0 is best used by managers of public computers to protect the PCs (and their users) from malware. It's also an effective way for individuals to roll back to a good configuration after a problem (such as a virus attack) occurs, though it has only one such restore point.  |
InternetNews June 10, 2005 Tim Gray |
Trojan Spreads in Michael Jackson Spotlight British anti-virus firm Sophos says hackers are slamming computers around the world with a Trojan virus by sending e-mails claiming Michael Jackson has tried to kill himself.  |
PC World April 2003 Zetter & Tweney |
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay.  |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code.  |
PC World August 17, 2001 Andrew Brandt |
Code Red Worm Crawls Again Here's how to protect your systems from the potential menace's monthly emergence...  |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards.  |
InternetNews October 3, 2005 Tim Gray |
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file.  |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source.  |
InternetNews September 30, 2010 |
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks.  |