Banking Trojans disguise attack targets in the Cloud
11 years ago | 6999 Views
G Data found a new configuration of the banking Trojan ZeuS
Cloud-Technologies are popular and widely spread – whether for storage of data, rented computational power or as part of protection technologies. Also cybercriminals discover the practical approach. Experts from G Data SecurityLabs spotted a new trend: Attacks by information stealers, a kind of malware which also includes banking Trojans, that are obscured using cloud technologies.
Click on the link below to read more:
http://blog.gdatasoftware.com/.../banking-trojans-disguise-attack-targets-in-the-cloud.html
If you are doing on-line banking, an anti virus system alone will give you no protection. You must install a complete internet security system.
Do you use an antivirus software on your PC?
1
Tags: banking Trojan, Trojan ZeuS, G Data, anti virus
Comments
SecNews 11 years
G Data detects these and other Trojans by using CloseGap, Behaviour Blocker and BankGuard.
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7372 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5782 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16746 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9143 Views -
Awful things are what happens
Posted: 2015 January 16 | 6860 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10077 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10726 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10714 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11864 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9210 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6409 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7561 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 17021 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7923 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6567 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7283 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6335 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6411 Views