This system utility monitors open TCP and UDP ports, network connections and software applications that open these connections. It...
Showing results 1 to 12 of 12
Trojan "most sophisticated cyber weapon" in market currently, but Verizon exec reckons its large file size and non-network-propagating nature means malware won't pose much of a threat globally.
Virgin Media has begun informing customers on its network if it thinks their computers are infected with a Trojan called SpyEye, the ISP said on Thursday.In an initiative launched in August last year as a response to the threat of the Zeus Trojan, the company is working with the Serious Organised Crime Agency (Soca) and other third parties to warn customers of infections.
RSA's FraudAction Research Lab is reporting that a crimeware targeting Brazilian banks, is using a popular social network as a command and control server. This isn't the first time that cybercriminals experiment with managed cloud platforms, or abuse of social networks for command and control purposes, and definitely not the last.
Users of the popular social network are being tricked into revealing their passwords and downloading a Trojan that steals financial data. Here's how...
Security researchers tracking the URL Zone malware/botnet have stumbled upon a new tactic being used by cyber-criminals to hide information on the money mules being used to transfer stolen funds from compromised online bank accounts.
Atelier Web Firewall Tester is a tool for probing Personal Firewall software strengths against outbond attempts from network trojan...
The imperviousness of the CAPTCHA has a security measure has been hotly debated, but there have been enough compromised network stories in the headlines to prompt D-Link to integrate the technique into its home and small office routers.CAPTCHA, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart, offers an extra hurdle in the way of malicious software intending to hijack your DNS, ruin your network and computer, including worms, viruses and Trojan horses.
Reports are starting to circulate of a botnet being seeded that could be more insidious than Storm, currently the largest and most sophisticated network of compromised computers.An article in Dark Reading warns of a Trojan that can circumvent most anti-malware products, being aimed at corporate networks.
BeeThink SpyDetector detects and blocks unknown spyware, adware, Trojans, and spy bots by means of monitoring network traffic. It checks...
BigPond, Australia's largest Internet service provider (ISP), has asked the Australian High Tech Crime Centre to investigate recent attacks on its domain name server (DNS) system from Trojan-infested PCs.The Telstra-owned ISP has been temporarily disconnecting compromised computers from its network to stem a tide of bogus DNS requests swamping its servers and delaying customer e-mail and Web site requests.
Worm? Trojan? Attack tool? Network administrators and security experts search for the cause of an increasing amount of odd data that has been detected on the Internet.
Many believe the weekend's trojan horse attack on Microsoft was a tiny partof a huge epidemic in lax network security. IT companies are being warned to update their systems on a daily basis.
A new variant of last year's "Pretty Park" virus is making the rounds, according to anti-virus firm Network Associates. The Trojan horse, which arrives as an e-mail attachment named "prettypark.
Security researchers at Network Associates Inc. say they have found another Back Orifice-like Trojan horse hack tool called BackDoor-G.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)