Banking trojan victims transformed into hapless mules

A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to investigators about where the money is going.First uncovered by Finjan Software last week,

Published on: October 7th, 2009 Robert MacMillan

Lawsuit demands banks divulge information about hack attacks

Anti-spam company Unspam Technologies Inc. filed a lawsuit on Wednesday aimed, in a somewhat roundabout way, at forcing banks to divulge any information they might have about hacking activities affecting their customer accounts.The

Published on: August 25th, 2009 Jaikumar Vijayan

How to know if your PC is bot infected and what to do about it

As fireworks boomed on the Fourth of July, thousands of compromised computers attacked U.S. government Web sites. A botnet of more than 200,000 computers, infected with a strain of 2004's MyDoom virus, attempted

Published on: August 25th, 2009 Robert Vamosi

Hackers make a killing trading compromised PCs on “Golden Cash”

It's dubbed the Golden Cash network, and serves as a type of online exchange for cybercrooks to buy and sell access to batches of compromised PCs.The reach and impact of Golden Cash botnet

Published on: June 22nd, 2009 Joaquim P. Menezes

$55 million telecom scam cracked, global hacker gang busted

A federal grand jury in New Jersey today indicted three people in connection with the hacking into the IT systems of thousands of companies worldwide to gain free access to telephone services, according

Published on: June 16th, 2009 Sharon Gaudin and Jeremy Kirk

Bot blitz expected as cybercrooks change tactics

The brief global reprieve in the flow of spam from infected computers is nearly over, with new and more resilient botnets filling the void since the shutdown of Internet Service Provider (ISP) McColo

Published on: January 29th, 2009 Brian Jackson

Top five security threats of 2008…and what lies ahead

If there's one big lesson Internet users should learn from 2008's security threats it is to trust no one – not a message on your Facebook wall, or even a video acceptance speech

Published on: December 31st, 2008 Michelle MacLeod

Hackers use holiday-themed malware to hijack PCs

New malware is spreading via Christmas and holiday greetings, security researchers said today, a tactic reminiscent of those used last season by the notorious Storm Trojan horse. Researchers at the Bach Khoa Internetwork

Published on: December 29th, 2008 Gregg Keizer

Bots could imperil your iPhone and blight your Blackberry

The ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the past several years.Looking to 2009, don't expect

Published on: October 21st, 2008 Jaikumar Vijayan

How hackers pull a fast flux on security enforcers

In the continuing computer security arms race, a technique called fast flux is the bad guys' latest way of thwarting attempts to shut down phishing scams and other Web nasties.Fast flux was first

Published on: August 29th, 2008 Grant Buckler

Rent-a-botnet service makes launching attacks easier

Online fraudsters that aren't highly skilled in the arts of cyber crime can now rent a service that offers an all-in-one hosting server with a built-in Zeus trojan administration panel and infecting tools,

Published on: May 16th, 2008 Andrew Hendrey

Security startups cash in on botnet scourge

A small group of IT security startups are hoping to cash in on the rise of the botnet scourge as businesses -- telecommunications carriers and Internet service providers, in particular -- seek new

Published on: January 4th, 2008 Matt Hines

Protecting end-users from themselves

The recent OS X-specific Mac Trojan ignited many hot conversations on various security mailing lists last week. Supposedly, the excitement regarding the Trojan is that it is the first time profit-seeking criminals have

Published on: November 13th, 2007 Roger A. Grimes