Quantcast

Latest Trojan horse Stories

Apple Attacked By Facebook Hackers
2013-02-19 14:38:10

Michael Harper for redOrbit.com — Your Universe Online Apple announced today they´re the latest to be attacked by the same hackers who targeted Facebook last Friday. Not surprisingly, these hackers used Oracle´s dangerous software platform Java to exploit computers located at Apple´s 1 Infinite Loop headquarters in Cupertino. Apple is now calling these attacks the “widest known cyber attacks” against Macs to date. These cybercriminals infected a software...

Hackers Are Getting Younger These Days
2013-02-08 11:15:26

Michael Harper for redOrbit.com — Your Universe Online To be honest, we all should have seen this coming. According to BBC News, AVG´s Virus Labs have discovered that children as young as 11 years old have been writing malicious code to hack into other systems. Unsurprisingly, these young children are using this code to hack into online gaming networks in order to steal digital currency used in the games as well as extra tools and weapons to help them progress through the...

2013-01-25 23:03:56

Botnets are large networks of systems or devices which have had their system security compromised and in turn can be used to do the cyber-bidding of an outside attacker, almost always without the system´s or device´s user ever even knowing it´s going on. Global Digital Forensics offers clients deep analysis malware testing to help uncover and eradicate the underlying Trojans and rootkits that let hackers enslave their many victims. New York, NY (PRWEB) January 25, 2013 With...

More Mac Malware Found By Intego
2012-12-04 12:28:23

Michael Harper for redOrbit.com — Your Universe Online Earlier this spring, a Russian security firm discovered a trojan piece of malware which took advantage of a Java vulnerability on many computers, Macs and PCs alike. This trojan, known as “Flashback,” was used to enlist some 600,000 infected computers into a botnet. Some of these computers were even located at Apple´s own 1 Infinite Loop campus in Cupertino, California. Now, the security experts at Intego have...

Expedition To Legendary City Of Troy Begins In 2013
2012-10-16 12:57:15

April Flowers for redOrbit.com - Your Universe Online “Like the generations of leaves, the lives of mortal men. Now the wind scatters the old leaves across the earth, now the living timber bursts with the new buds and spring comes round again. And so with men: as one generation comes to life, another dies away.” “• Homer, The Iliad The city-state of Troy is the stuff of legends, with mythical heroes, women of unsurpassed beauty and the fabled wooden Trojan Horse....

US Cyber War With Iran Larger Than Suspected
2012-09-17 13:43:43

Michael Harper for redOrbit.com — Your Universe Online Earlier this year, the Iranian nuclear program was attacked by a powerful and targeted form of cyber weaponry known as the Stuxnet Trojan. Then in May, a cyber-surveillance tool called Flame was uncovered and was later called "the most sophisticated cyber weapon yet unleashed" by researchers at Kaspersky Labs. It was later discovered that US military and intelligence agencies — including the CIA and NSA — had worked...


Word of the Day
barratry
  • The offense of persistently instigating lawsuits, typically groundless ones.
  • An unlawful breach of duty on the part of a ship's master or crew resulting in injury to the ship's owner.
  • Sale or purchase of positions in church or state.
This word ultimately comes from the Old French word 'barater,' to cheat.
Related