Latest Trojan horse Stories
WALTHAM, Mass., Jan. 28 /PRNewswire/ -- Application Whitelisting industry leader Bit9 announced today that Application Whitelisting is being used to prevent the current Internet Explorer (IE) zero-day attacks.
- Out of 430 million email messages analyzed, 89.88 percent were spam and 1.11 percent were infected with some type of malware - Sexual performance enhancers and pharmaceuticals were the most common subjects used by spam in 2008 - In the last three months of the year, 301,000 zombie computers were activated and used for distributing spam GLENDALE, Calif., Jan.
Just one day after Microsoft distributed a rare emergency security patch, hackers have found new ways to exploit the bug.
BitDefender researchers have identified a new large spam wave featuring abusive use of overnight shipping company names to deceive users into downloading extremely dangerous malware.
By Associated Press SAN FRANCISCO -- Did a computer intrusion at a Best Western hotel in Germany open the door for a hacker to steal the records of 8 million customers and pull off "the greatest cyber-heist in world history," as a Scottish newspaper put it? Or was the incident a significantly more minor affair, affecting only 10 customers at the one facility, as claimed by Best Western International Inc.? The Phoenix-based hotel chain and the Sunday Herald newspaper of Scotland are duking...
Two well-known threats have ranked high on BitDefender's Top Ten E-Threats in July. According to BitDefender analysts, Trojan.Clicker.CM and Trojan.Downloader.WMA.Wimad.N, which have remained relevant throughout the summer, ranked first and second place on the list of dangerous threats.
A new malware distribution scheme performed via spam messages aimed at tricking computer users to download and install malicious applications on their computers has been identified by BitDefender(R), an award-winning provider of antivirus software and data security solutions, today.
BitDefender researchers have identified a new wave of spam messages that announce an alleged attack of the US Army against Iran in order to trick users into downloading and installing malicious software onto their personal computers.
A recent computer security breach that left 40 million credit cards vulnerable to fraud shows how online criminals are scoring big by thinking small, experts said on Monday. Cybercriminals are increasingly crafting more focused attacks with a potential for profit as they target one or two companies at a time.
- The act of sweetening by admixture of some saccharine substance.