The Latest in IT Security

Posts Tagged ‘trojan’

Here’s a question we’re often asked: what’s the economic cost of malware?We recently assisted in a joint investigation with the Finnish Police and CERT-FI. And in this particular case – we estimate that just one gang of “police” (themed) ransomware could be responsible for more than 800 million dollars worth of damage and losses.Details from […]

Read more ...

Technologies change, but cybercriminals will always dream up new ways to fool you into handing over your bank details – whether via phishing emails, SMS or by phone. Hesperbot – a new Trojan detected by ESET – uses hi-tech methods to bypass bank security systems, and clever social engineering to ensure victims play along. These […]

Read more ...

Banking Trojans traditionally use configuration files that have been stored on the computer being attacked. These configuration files contain the addresses of the compromised websites, and the code, called the Webinject, which they are seeking to add to these websites via the banking Trojans. This code is then responsible for stealing access data and personal […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments