Devious Trojan Attacks Online Banks

A new Trojan called "W32.Silon" is the latest headache for online banks and their customers, packing a one-two punch that helps it evade security tokens and steal customer log-in information at the same time.The two-headed Trojan, according to online security software vendor Trusteer, uses a "two-pronged payload" to steal log-in information and commit financial fraud at popular online banks."This new Trojan illustrates how advanced malware writers have become in their ability to dynamically execute multiple, bank-specific attacks with a single...

How hackers find your weak spots

A look at some of the ways hackers use social networking tools to gain access to victims' systems While there are an infinite number of social engineering exploits, typical ones include the following:Stealing passwords: In this common maneuver, the hacker uses information from a social networking profile to guess a victim's password reminder question. This technique was used to hack Twitter and break into Sarah Palin's e-mail.Friending: In this scenario, a hacker gains the trust of an individual or group and then gets them to...

How dangerous could a hacked robot possibly be?

What happens when the robots are turned against us?SO THIS IS MY REQUEST TO ALL READER READ THIS ARTICLE CAREFULLY SPECIALLY THOSE WHICH ARE USING ROBOT OR WORKING WITH ROBOT......AJEETBut researchers at the University of Washington think it's finally time to start paying some serious attention to the question of robot security. Not because they think robots are about to go all Terminator on us, but because the robots can already be used to spy on us and vandalize our homes.Robots have emerged as popular consumer devices over the past few years...

Hacker Claims First Windows 7 'Zero Day'

Windows 7 hasn't even been on the street for a month, yet one hacker has already found what he claims is a zero-day (define) vulnerability -- albeit so far the result of an attack is simply to crash the new system.Hacker Laurent Gaffié, who last August found a problem in the "release candidate" (RC) version of Microsoft (NASDAQ: MSFT) Windows 7, announced his find on Wednesday. He also published proof-of-concept code to cause such crashes.After some controversy last summer, Microsoft said that the bug Gaffié found that time affected some late,...

SOME PC Security Threats for 2010

1) Windows 7 will come in the crosshairs of attackersMicrosoft has already released the first security patches for its new operating system. As long as humans are programming computer code, flaws will be introduced, no matter how thorough pre-release testing is. And the more complex the code is, the more likely that undiscovered vulnerabilities exist.Microsoft’s new operating system is no exception, and as Windows 7 hits the pavement and gains traction in 2010, attackers will undoubtedly find ways to exploit its users.2) Fast Flux botnets will...

PC Security Threats for 2010

We love to click,Clicking on links and attachments that are accompanied by just the slightest bit of social engineering appears to be a basic human need." A report released earlier this year by the Anti-Phishing Working Group (APWG) found that fake anti-malware and security software programs soared up more than 585 percent in the first half of 2009 alone. In 2007, Gartner said that more than 3.6 million people lost more than $3.2 billion to malicious phishing scams. 1) Antivirus is not enoughWith the rise of polymorphic threats and the explosion...

Prevent Your Home Robot From Being Hacked!

Commercial, tele-operated home robots are vulnerable to hacking and leave users open to potential risk, according to a recent paper by researchers at the University of Washington.Tele-operated robots let users remotely interact in the physical world through them, usually through a wireless connection (think of a primitive form of the robots in The Surrogates). Equipped with wheels, cameras, microphones and speakers, ‘tele-presence’ robots stream...

Robot security: the next threat

Researchers at the University of Washington warn that most robotic software is not secure.According to Network World,Tadayoshi Kohno, a University of Washington assistant professor said that research into robotics shows that security is mostly an afterthought. He said that he was shocked how easy it was to compromise robots and the damage that they could do as a result. Some robots operate as wireless access points, and Kohno's team found that a...

US government opens $9m cyber security center

The US government is promising a more coordinated approach to cyber attacks, with the creation of a new $9 million cyber security center. The National Cybersecurity and Communications Integration Center in northern Virginia will integrate the US Computer Emergency Readiness Team and the National Coordinating Center for Telecommunications. Apparently, US government computer systems are scanned millions of times a day by potential hackers, criminals and hostile nation states. Meanwhile, speaking to Chamber of Commerce executives, Senator Joe Lieberman...

Timeline of computer viruses and worms

This is a timeline of noteworthy computer viruses, worms and Trojan horses. 1970-1979 1971 * The Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN. Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper. 1974 * The Wabbit...

Fighting off Viruses:----kbsmp

How to Protect Your Computer Fortunately, protecting your computer against the latest viruses is much easier with the improvements that have been made in antivirus software programs. Antivirus software is an integral part of a computer's defense against malicious software, such as viruses and bad programs. This software can help to defend your computer against viruses, which can enter your system through e-mail, servers, or by simply surfing the internet. This software also provides a centralized control feature, to deal with deploying, updating,...

Five rules for protecting Windows with antivirus software

Good antivirus software is a critical part of any Microsoft Windows system that communicates with other computers, particularly if it is connected to the Internet and deals with browser, email, or instant messenger traffic. It seems like everybody has his or her favorite antivirus solution and it is different from everyone else’s. For personal desktop systems, however, there are some rules of thumb that seem to be fairly universal among security experts: Install your AV software before connecting to the Internet. Any MS Windows computer should...

Internet Viruses Can Target Your Computer

No matter who you talk to, everyone has either had a computer virus or knows of someone who has gone through the agony of trying to get rid of the problem. Computer viruses are a hot topic that seem to affect everyone who owns a computer system, whether at work or at home.The companies that produce software programs that catch and delete these computer viruses are constantly updating their databases for virus types and definitions so that they can better protect your system against all the newest viruses. Creating virus protection programs is a...

Firewall Protection - Why You Need It?

If your house has an alarm system, surveillance cameras, or any type of security equipment to prevent burglars, then you can compare it to a firewall. A firewall will monitor and limit connections to your computer from the internet and other users. A computer without a firewall is defenseless, and makes it easier for hackers or unwanted programs to invade your computer. There are two types of firewalls, hardware or software. Routers are devices that act as hardware firewalls. They prevent other users and unwanted software from entering your network....

11 Ways to Prevent Computer Viruses

It doesn’t matter if you’ve been on the Internet for five minutes or five years, you’ve probably thought about ways in which you can prevent a computer virus from entering your machine. A virus can compromise your personal information and even destroy your computer completely. Luckily, there are many low cost things you can do to protect yourself and stay one step ahead of the hackers. Here are 11 things you can do to help prevent computer viruses from invading your computer.1. Install a reliable anti virus program – From the first moment you turn...

Internet Viruses Can Target Your Computer

No matter who you talk to, everyone has either had a computer virus or knows of someone who has gone through the agony of trying to get rid of the problem. Computer viruses are a hot topic that seem to affect everyone who owns a computer system, whether at work or at home.The companies that produce software programs that catch and delete these computer viruses are constantly updating their databases for virus types and definitions so that they can better protect your system against all the newest viruses. Creating virus protection programs is a...

Is Free Antivirus Software Worth It?

If you are planning on hooking up your computer to a network or to the Internet, an anti virus protection program is an absolute must. Along with a firewall, these two programs are the only real line of defense you have against hackers, viruses and other problems that can plague Internet users.The world of anti virus software is divided up into two main categories: programs that you pay for, such as BitDefender and Kaspersky and ones you can download for free. While having free anti virus software is significantly better than no protection at all,...

What are XP and Vista Rootkits?

With every new year comes a new batch of malicious computer viruses for us to all be aware of. One of the most common types of viruses are known as XP and Vista rootkits. These viruses allow a third party user to take control of your computer. They can either edit or embed themselves in your operating system and allow someone else to become the root user, or the administrator of your computer. This gives them the ability to look for personal information such as credit card numbers or it can allow them to haphazardly delete information you need....

Be Aware of Phishing Scams

surf the web, purchase products over the web or use the many financial services offered by your credit card company, bank and even Paypal and Ebay, then you should be aware of Phishing scams and how they can affect you personally. Phishing scams is when hackers or criminals masquerade as a legitimate entities in order to steal sensitive information such as credit card numbers, social security numbers, etc to commit fraud. Phishing scams are numerous on the web and can affect almost anyone. Here are some tips to easily spot phishing scams and...

HOW TO DETERMINE FAKE MAIL OR FISHING MAIL

Find the link they are trying to get you to click, without clicking on the link highlight over it, and look in the lower left hand corner of the email window. It should show a URL. If the URL does not begin with:http://www.[domain].com...where [domain] is the domain of company in which the email is about. So in this example, paypal is the domain - so the URL must begin with http://www.paypal.com. If it has anything else after the http://. IT IS A SCAM! Do not even click it.Some email programs will not show the URL in the lower left of the window,...