Latest Trojan horse Stories
The city-state of Troy is the stuff of legends, with mythical heroes, women of unsurpassed beauty and a fabled wooden horse. Now a cross-disciplinary team of scientists will begin a new excavation project in 2013.
Earlier this year, the Iranian nuclear program was attacked by a powerful and targeted form of cyber weaponry known as the Stuxnet Trojan. Then in May, a cyber-surveillance tool called Flame was uncovered and was later called "the most sophisticated cyber weapon yet unleashed" by researchers at Kaspersky Labs. It was later discovered that US military and intelligence agencies – including the CIA and NSA – had worked together with the Israeli military to craft this malicious software in an...
Cyber terrorism fighters everywhere have scored a small victory this week as Joshua Schichtel was sentenced to thirty months in prison for running a botnet that infected some 72,000 computers.
A virus on a computer can be bad enough, possibly leading to hacked accounts and even broken hardware. A virus on your car’s computer however, could be downright dangerous.
Russian security firm Kaspersky Labs has called for help from the world’s leading cryptographers to help break the encryption of what remains a still-mysterious and potentially devastating warhead delivered by the Gauss cyber-surveillance malware.
The US Federal Bureau of Investigation (FBI) has issued another warning to computer owners to check their desktops and laptops for a piece of malware that could cause them to lose Internet access in a few months if the problem is not addressed.
Hackers who have downloaded a tool to help Anonymous launch distributed denial-of-service (DDoS) attacks may also have unwittingly downloaded a piece of malware that has compromised their online banking accounts, a U.S. security firm has revealed.
- To play, gamble.
- To impose upon; delude; trick; humbug; also, to joke; chaff.
- A deceitful game or trick; trickery; humbug; nonsense.