BeeThink SpyDetector detects and blocks unknown spyware, adware, Trojans, and spy bots by means of monitoring network traffic. It checks...
Showing results 1 to 12 of 12
RSA's FraudAction Research Lab is reporting that a crimeware targeting Brazilian banks, is using a popular social network as a command and control server. This isn't the first time that cybercriminals experiment with managed cloud platforms, or abuse of social networks for command and control purposes, and definitely not the last.
Security researchers tracking the URL Zone malware/botnet have stumbled upon a new tactic being used by cyber-criminals to hide information on the money mules being used to transfer stolen funds from compromised online bank accounts.
A strain of malware disguised as anti-spyware has become the latest double-agent in multi-step "convergence" crime online.
Security vendors have warned that the "Happy New Year" worm could catch employees returning from New Year's celebrations unawares, but believe the threat posed by the malware will soon pass.The worm, which was first detected last last week, is sent as an email attachment called either postcard.
Banks and security experts cannot agree if it is safe for banks to use e-mail for communicating with their customers because the medium has been hijacked by criminals who try and fool online banking users into divulging their log-in details. Last week, ZDNet Australia reported that an e-mail sent by Citibank confused both customers and security experts because neither group could distinguish the genuine e-mail from a phishing attack.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
Thousands of copies of two new Trojans have been detected trying to enter networks worldwide, a security company warns.
Tens of thousands of copies of two dangerous pieces of malware have been detected today
Virtually yours: 54,000 Trojans detected so far...
Anything you want to know about cracking, hacking, legislation, network monitoring, spam, spyware, Trojans, viruses, worms...?
Some ISPs are finding their email systems clogged by spam, dramatically slowing the delivery of messages to customers
Security researchers at Network Associates Inc. say they have found another Back Orifice-like Trojan horse hack tool called BackDoor-G.