Trojan, threat of financial security
Technology criminals will be online with you in transactions to steal money. The warning of experts on a new situation worrisome in financial transaction security. Trojans stealing accounts are operating very violently. This software will hide noodles
Photo: Fotosearch
Technology criminals will be online with you in transactions to steal money. The warning of experts on a new situation worrisome in financial transaction security.
Trojans stealing accounts are operating very violently. This software will hide itself on your computer as soon as you open an e-mail attachment or visit a malicious website. However, instead of being "acknowledged" by increasingly rigorous control and authentication regimes, technology criminals tend to change their operating strategies.
Alex Shipp, senior veteran of anti-virus technology from MessageLabs, spoke at a discussion at the RSA 2006 conference (16-2): ' We see a shift from robbery. Your account and password. New types of Trojans will wait until the victim, ie you, has logged in to your bank account completely, then transfer money out.
Therefore, all the authentication measures, the arts of image coding, biometrics are no longer a big problem for them. Bad guys just wait for you to finish logging in and can attack . "
This new Trojan is on the brink of growing, currently ranked third in MessageLabs's list of permanent dangers. Leading the list is remote control with malicious codes, turning a computer or a computer network into Zombie PCs (computers are controlled and remotely controlled by hackers, becoming play centers Spread spam, ads or attack other computers).
Second place is scams that take the user's financial account, often called phising scams, like anonymously your banking website, your relatives .
The drawback of this new type of Trojan is that it only works specifically with a certain bank account. However, the bank list is getting more and more.
The types of Trojans in this group often infect machines via email paths, with links that look at first glance seem harmless, for example an online card, even a promotional word that is charitable. However, if you accidentally touch it, immediately, a malicious program has been silently installed on your computer and doesn't work until you access it.
The development of attack patterns is a huge challenge for customers, even with security experts like Boeing's Jeanette Jarvis. He said that since 2002, Boeing has seen a 110-fold increase in the amount of malicious code they block at the gateway to their network. Mr. Javis said: "As soon as we had a strategy against it, they had a new plan and attack method."
In the past, hackers and virus writers were primarily for the purpose of reputation or scandal, and today, financial goals are top. Professional criminals also realize that it may be safer to attack online than to rob a bank by passing steel walls and weapons guns.
Mr. David Perry, Trend Micro's global director of education, said that the industry must aim to find a solution to prevent customers' risk of " reducing confidence in Internet ", otherwise the Internet will not There are some implications for the current e-commerce.
TRAN HUY
- Trojan detection 'bot' takes advantage of WMF errors
- The fake Trojan add-on Trojan is extremely dangerous
- Detection of development assistance program ... trojan
- Trojan forged Microsoft security warnings
- Trojans are a threat to users
- The new Trojan bypasses the virtual keyboard face
- New Trojan forged McAfee
- Add new Trojan for ransom
- Apple fake Trojan sales announcement
- The Trojan impersonates software that activates Windows
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system