Banking Trojans disguise attack targets in the Cloud
11 years ago | 6985 Views
G Data found a new configuration of the banking Trojan ZeuS
Cloud-Technologies are popular and widely spread – whether for storage of data, rented computational power or as part of protection technologies. Also cybercriminals discover the practical approach. Experts from G Data SecurityLabs spotted a new trend: Attacks by information stealers, a kind of malware which also includes banking Trojans, that are obscured using cloud technologies.
Click on the link below to read more:
http://blog.gdatasoftware.com/.../banking-trojans-disguise-attack-targets-in-the-cloud.html
If you are doing on-line banking, an anti virus system alone will give you no protection. You must install a complete internet security system.
Do you use an antivirus software on your PC?
1
Tags: banking Trojan, Trojan ZeuS, G Data, anti virus
Comments
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7362 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5773 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16736 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9129 Views -
Awful things are what happens
Posted: 2015 January 16 | 6854 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10060 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10717 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10702 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11852 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9198 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6398 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7550 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 16951 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7915 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6558 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7273 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6317 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6403 Views
Categories