Blog Posts Tagged with "Trojans"

69dafe8b58066478aea48f3d0f384820

Java Applet Distributes Trojan via Downloader Injection

December 31, 2010 Added by:Headlines

More than two-thousand weblinks direct users to domains that can inject malicious code by way of a Java downloader applet. The code is contained in the HTML of the infected sites, and infects the visitor's computers with a hidden iFrame containing a JavaScript function...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Top Five Internet Security Vulnerabilities

December 22, 2010 Added by:Headlines

Security in the cyber space is paramount, but in the face of reduced budgets caused by the poor economy, many business are letting security best practices fall to the way side. Astaro has comprised the following top five internet vulnerabilities businesses can not afford to ignore...

Comments  (0)

Ba5964a1284ac16d4277991e7225699c

Google Gets More Aggressive with Site Owners

December 20, 2010 Added by:Jason Remillard

As the risks increase - via trojan downloads, increasing malware attacks via ad servers and general widespread effective usage of Google Search Results themselves to find new targets - Google will continue to increase pressure on site owners to share the responsibility for Internet Security...

Comments  (1)

065b7cfbbb03ac9d18cbf5ed0615b40a

Reality Check: Traditional Perimeter Security is Dead

December 15, 2010 Added by:Stefan Fouant

An all-inclusive security posture looks at the network from a holistic point of view. The principles of Defense-in-Depth will make evident the failings of the traditional perimeter model. The traditional perimeter is dead. The perimeter is wherever the data is...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Using Man-In-The-Middle on Retailer Sites

December 10, 2010 Added by:Headlines

A security company reports they have detected the use of man-in-the-middle and social engineering tactics in conjunction with the Zeus Trojan to skim credit card numbers and personal information when consumers are visiting the websites of large commercial retailers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Tweaked to Pilfer Business Bank Accounts

December 06, 2010 Added by:Headlines

The nefarious Zeus Trojan has been modified to target enterprise bank accounts. Zeus had previously netted millions of dollars after spreading through tainted emails and communications designed to look like messages from the popular business-oriented social networking service LinkedIn...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Russian Banks May Be Linked to Zeus Hackers

November 18, 2010 Added by:Headlines

The Chief of the Russian Financial Monitoring Service, Yury Chikhankin, announced a pending investigation into whether Russian financial institutions participated in laundering funds stolen by those responsible for the infamous Zeus Trojan virus...

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Mac Users Beware

November 12, 2010 Added by:Mark Baldwin

There is a widespread belief that Mac OS X is inherently more secure than Windows and that by using a Mac, one is protected from all threats. Unfortunately, not only is this not true, it is dangerous, as it leads people to not take appropriate precautions to protect their computers...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Strong Passwords Are Not Enough

September 24, 2010 Added by:Robert Siciliano

Adding one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.It is just as important that your PC is free of malicious programs such as spyware and key-loggers. Beware of RATS a.k.a Remote Access Trojans...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »