Showing results 1 to 12 of 12

Open Ports Scanner

This system utility monitors open TCP and UDP ports, network connections and software applications that open these connections. It...

November 19, 2012 By Filesland

Virgin warns Trojan-infected customers

Virgin Media has begun informing customers on its network if it thinks their computers are infected with a Trojan called SpyEye, the ISP said on Thursday.In an initiative launched in August last year as a response to the threat of the Zeus Trojan, the company is working with the Serious Organised Crime Agency (Soca) and other third parties to warn customers of infections.

June 17, 2011 by

RSA: Banking trojan uses social network as command and control server

RSA's FraudAction Research Lab is reporting that a crimeware targeting Brazilian banks, is using a popular social network as a command and control server. This isn't the first time that cybercriminals experiment with managed cloud platforms, or abuse of social networks for command and control purposes, and definitely not the last.

July 19, 2010 by

Atelier Web Firewall Tester

Atelier Web Firewall Tester is a tool for probing Personal Firewall software strengths against outbond attempts from network trojan...

February 11, 2010 By Atelier Web

D-Link adds CAPTCHA to home, small office routers

The imperviousness of the CAPTCHA has a security measure has been hotly debated, but there have been enough compromised network stories in the headlines to prompt D-Link to integrate the technique into its home and small office routers.CAPTCHA, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart, offers an extra hurdle in the way of malicious software intending to hijack your DNS, ruin your network and computer, including worms, viruses and Trojan horses.

May 11, 2009 by

Botnet more dangerous than Storm?

Reports are starting to circulate of a botnet being seeded that could be more insidious than Storm, currently the largest and most sophisticated network of compromised computers.An article in Dark Reading warns of a Trojan that can circumvent most anti-malware products, being aimed at corporate networks.

February 8, 2008 by

BeeThink SpyDetector

BeeThink SpyDetector detects and blocks unknown spyware, adware, Trojans, and spy bots by means of monitoring network traffic. It checks...

December 28, 2009 By MB Company

High-tech crime investigators tackle BigPond assault

BigPond, Australia's largest Internet service provider (ISP), has asked the Australian High Tech Crime Centre to investigate recent attacks on its domain name server (DNS) system from Trojan-infested PCs.The Telstra-owned ISP has been temporarily disconnecting compromised computers from its network to stem a tide of bogus DNS requests swamping its servers and delaying customer e-mail and Web site requests.

April 18, 2005 by

New Pretty Park virus in the wild

A new variant of last year's "Pretty Park" virus is making the rounds, according to anti-virus firm Network Associates. The Trojan horse, which arrives as an e-mail attachment named "prettypark.

March 2, 2000 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories