Last July’s shutdown of a GPS vehicle tracking system used by German police to monitor suspects has apparently been traced back to an officer’s incompetent attempt to monitor his daughter’s Internet use with a spy Trojan. As reported by German magazine Der Spiegel, the policeman from Frankfurt am Main planted…
‘Saudi’ hacker targets Israel with Trojan horse virus
A self-defined “Saudi hacker” who twice this week posted details of thousands of Israeli credit cards hit again on Friday with a new Internet file containing a Trojan horse virus, public radio said. According to the report, the hacker who goes by the name “0xOmar” posted what appeared to be…
‘Saudi’ hacker targets Israel with Trojan horse virus
A self-defined “Saudi hacker” who twice this week posted details of thousands of Israeli credit cards hit again on Friday with a new Internet file containing a Trojan horse virus, public radio said. According to the report, the hacker who goes by the name “0xOmar” posted what appeared to be…
Duqu malware advice: Should enterprises worry about the Duqu Trojan?
Enterprise threats expert Nick Lewis offers analysis of the recent Duqu malware outbreak and the Duqu Trojan response enterprises should take. <img alt="Duqu malware advice: Should enterprises worry about the Duqu Trojan?, Blog, Trojan, about, malware, Should, Advice, Duqu, enterprises, worry"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on…
SpyEye bank Trojan picks up new fraud hiding tricks
A powerful bank fraud software program, SpyEye, has been seen with a feature designed to keep victims in the dark long after fraud has taken place, according to security vendor Trusteer. SpyEye is notable for its ability to inject new fields into a web page, a technique called HTML injection,…
New ransom Trojan cons victims with ‘trial’ version
Researchers at security company BitDefender have discovered a new ransom Trojan that scrambles its victims’ data before cheekily offering them a ‘trial’ version of the software to prove its ability to successfully unlock files. For the most part, Trojan.Crypt.VB.U and its variants behave much like any other ransom scam. Once…
Computer tech law: like a giant Trojan worm
The political effect of such a broad approach is to splinter criticism, not allowing focus on a single point of attack. This places the politician and bureaucrat in a position to cherry pick which arguments to uphold, which to reject, while keeping the essence unchanged. The Peaceful Assembly Bill is…
Apple issues late XProtect update for Flashback Trojan
As with many modern operating systems, OS X is relatively difficult to infect with self-propagating malware attacks like viruses or worms, so malware developers have resorted to social engineering and trickery, with Trojan horse programs being the main mode of attack on home computer systems. A Trojan horse is a…
Could your printer be a Trojan horse? Researchers say yes!
Columbia University researchers report new security flaws in networked printers that could open up an entirely new array of security threats. View full post on could security – Yahoo! News Search Results View full post on National Cyber Security