Storm became a
The Trojan is responsible for controlling users' computers to form huge cyber-computer networks (botnets). Security experts confirmed that the number of malicious e-mail increased 1,700% in July directly related to Storm.
The Trojan is responsible for controlling users' computers to form huge cyber-computer networks (botnets). Security experts confirmed that the number of malicious e-mail increased 1,700% in July directly related to Storm.
At the same time, Storm defeated the performance of the Sober worm, a dangerous software that has been around since 2003, and peaked in the mid-to-late 2005 through the spread of malicious e-mail messages with content. campaign in Germany or videos of actor Paris Hilton.
US security firm MX Logic said that along with the strong development of phishing spam in the "pump-and-dump" stock market, Trojan Storm is making spam rise to an alarming level last month and the situation remains continue this month.
MessageLabs also affirmed that this is one of the most successful malicious programs they have ever recorded. The company found Storm began to operate strongly in late June when users' mailboxes were flooded with e-mail pretending to contain links to e-card pages. Due to the summer vacation, many people fell into the trap, giving Storm the opportunity to enroll the victim's PC into the botnet.
- Tropical depression strengthened into storm No. 2, heading to Quang Ninh - Hai Phong
- Storm Dianmu accelerated, Hanoi prepared to catch a storm
- Why is storm No. 10 the first storm in Vietnam to be warned red?
- Standing still for 24 hours, storm No. 4 is about to accelerate
- Cyclone storm, typhoon typhoon and storm tropical storm What's the difference?
- A strong storm of level 14 appeared in the South China Sea
- Storm No. 10 approached the land of Ha Tinh - Quang Binh
- A new storm appeared on the east sea, storm Pakhar
- Mujigae storms move faster and stronger
- Tropical depressions intensified into storm No. 10
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system