This system utility monitors open TCP and UDP ports, network connections and software applications that open these connections. It...
Showing results 1 to 19 of 19
Trojan "most sophisticated cyber weapon" in market currently, but Verizon exec reckons its large file size and non-network-propagating nature means malware won't pose much of a threat globally.
Virgin Media has begun informing customers on its network if it thinks their computers are infected with a Trojan called SpyEye, the ISP said on Thursday.In an initiative launched in August last year as a response to the threat of the Zeus Trojan, the company is working with the Serious Organised Crime Agency (Soca) and other third parties to warn customers of infections.
RSA's FraudAction Research Lab is reporting that a crimeware targeting Brazilian banks, is using a popular social network as a command and control server. This isn't the first time that cybercriminals experiment with managed cloud platforms, or abuse of social networks for command and control purposes, and definitely not the last.
Users of the popular social network are being tricked into revealing their passwords and downloading a Trojan that steals financial data. Here's how...
Security researchers tracking the URL Zone malware/botnet have stumbled upon a new tactic being used by cyber-criminals to hide information on the money mules being used to transfer stolen funds from compromised online bank accounts.
Atelier Web Firewall Tester is a tool for probing Personal Firewall software strengths against outbond attempts from network trojan...
The imperviousness of the CAPTCHA has a security measure has been hotly debated, but there have been enough compromised network stories in the headlines to prompt D-Link to integrate the technique into its home and small office routers.CAPTCHA, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart, offers an extra hurdle in the way of malicious software intending to hijack your DNS, ruin your network and computer, including worms, viruses and Trojan horses.
Reports are starting to circulate of a botnet being seeded that could be more insidious than Storm, currently the largest and most sophisticated network of compromised computers.An article in Dark Reading warns of a Trojan that can circumvent most anti-malware products, being aimed at corporate networks.
BeeThink SpyDetector detects and blocks unknown spyware, adware, Trojans, and spy bots by means of monitoring network traffic. It checks...
A strain of malware disguised as anti-spyware has become the latest double-agent in multi-step "convergence" crime online.
Security vendors have warned that the "Happy New Year" worm could catch employees returning from New Year's celebrations unawares, but believe the threat posed by the malware will soon pass.The worm, which was first detected last last week, is sent as an email attachment called either postcard.
Banks and security experts cannot agree if it is safe for banks to use e-mail for communicating with their customers because the medium has been hijacked by criminals who try and fool online banking users into divulging their log-in details. Last week, ZDNet Australia reported that an e-mail sent by Citibank confused both customers and security experts because neither group could distinguish the genuine e-mail from a phishing attack.
Thousands of copies of two new Trojans have been detected trying to enter networks worldwide, a security company warns.
Tens of thousands of copies of two dangerous pieces of malware have been detected today
Virtually yours: 54,000 Trojans detected so far...
BigPond, Australia's largest Internet service provider (ISP), has asked the Australian High Tech Crime Centre to investigate recent attacks on its domain name server (DNS) system from Trojan-infested PCs.The Telstra-owned ISP has been temporarily disconnecting compromised computers from its network to stem a tide of bogus DNS requests swamping its servers and delaying customer e-mail and Web site requests.
Some ISPs are finding their email systems clogged by spam, dramatically slowing the delivery of messages to customers
Worm? Trojan? Attack tool? Network administrators and security experts search for the cause of an increasing amount of odd data that has been detected on the Internet.
Many believe the weekend's trojan horse attack on Microsoft was a tiny partof a huge epidemic in lax network security. IT companies are being warned to update their systems on a daily basis.
A new variant of last year's "Pretty Park" virus is making the rounds, according to anti-virus firm Network Associates. The Trojan horse, which arrives as an e-mail attachment named "prettypark.
Security researchers at Network Associates Inc. say they have found another Back Orifice-like Trojan horse hack tool called BackDoor-G.