Latest Trojan horse Stories
A zero-day flaw has been found in Microsoft’s Internet Explorer 8 (IE8), a four year old version of their popular web browser. Security experts and Microsoft alike have pointed out this flaw which has been found to be used by Chinese hackers to target US nuclear researchers in watering-hole attacks.
Apple announced today they’re the latest to be attacked by the same hackers who targeted Facebook last Friday. These hackers used Oracle’s software platform Java to exploit computers located at Apple’s 1 Infinite Loop headquarters in Cupertino.
To be honest, we all should have seen this coming. AVG’s Virus Labs have discovered that children as young as 11 years old have been writing malicious code to hack into other systems.
Botnets are large networks of systems or devices which have had their system security compromised and in turn can be used to do the cyber-bidding of an outside attacker, almost always without
The security experts at Intego have discovered yet another piece of Mac malware that uses the same Java exploit as the previous Flashback trojan.
- An imitative word; an onomatopoetic word.