The New Enemy: A Trojan Worse Than Phishing

Ben-Itzhak, Yuval
November 2007
Bank Technology News;Nov2007, Vol. 20 Issue 11, p57
Trade Publication
The article discusses the crimeware Trojan which is used to steal valuable business data in financial institutions. It is noted that these attacks are severe since most companies conduct online banking which would expose the company to crimeware. Finjan company offers tips for individual and corporate bank customers regarding online banking applications.


Related Articles

  • New Banking Trojan Horses Gain Polish. Vamosi, Robert // PCWorld;Jan2010, Vol. 28 Issue 1, p41 

    The article reports on the emergence of more sophisticated Trojan horses as banks improve their ability to detect and fight fraud. Among the new malware used by criminals in hijacking active online banking sessions is the URLzone, which has the ability to spook bank pages. The sophistication of...

  • Security News and Products: Finjan's Research Unveils Botnet Trading Platform for hacked PCs.  // Software World;Jul2009, Vol. 40 Issue 4, p23 

    The article reports on the research by the Malicious Code Research Center of Finjan Inc. which reveals a trading platform of Golden Cash network wherein malware-infected personal computers (PCs) are sold and bought for profit. It explains that under the trading platform batches of 1,000 infected...

  • Finjan's Latest Analysis of Web Security.  // Database & Network Journal;Apr2007, Vol. 37 Issue 2, p22 

    The article reports that Finjan has published the results of research at its Malicious Code Research Center at www.finjan.com. Its Web Security Report summarizes the analysis of more than 10 million unique URLs based on live Internet traffic recorded in Great Britain. It was observed that as...

  • When Malware Strikes: How to clean an infected PC. SPECTOR, LINCOLN // PCWorld;Sep2013, Vol. 31 Issue 9, p177 

    The article offers tips on how to clean a malware-infected computer. To verify if a computer that is unusually slow is infected with a virus, check on the Processes tab of the Task Manager if there if there is any strange background application. According to the author, among the sure signs of...

  • INFECTED.  // Computer Active;Jun2013, Vol. 8 Issue 6, p34 

    The article focuses on the threats posted by the infections to computer security infections. It notes the possible occurrence of infections on computers despite the installation of antivirus software. It suggests users to run scans regularly to spot malware infections. It points out that...

  • PROTECTING GUEST DATA: What to Do about Malware. Goodendorf, Lynn // Hospitality Upgrade;Summer2011, p180 

    The article discusses the result of the 2010 Data Breach Investigation Report by Verizon and the U.S. Secret Service, which revealed that 85% of cyber attacks were not considered highly difficult. It mentions the importance of taking actions to prevent malware infection, which is being used by...

  • Beware the enemy within. Castle, Ian // SC Magazine: For IT Security Professionals (UK Edition);Jan2009, p17 

    The author reflects on insider computer security threats. He points out that insider threats have more impact compared with external threats. He argues that while external threats are results of random drive-by attacks, mass mailing of a trojan downloader or a link to a malware, insider attacks...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p10 

    Statistics are presented related to the threat on online security which includes the April 2013 malware vertical encounter rate for several industries, the top April 2013 breaches in data loss, and the top five attacks used by U.S. hackers.

  • Malware Antimalware Games. Singh, Anshuman; Lakhotia, Arun; Walenstein, Andrew // Proceedings of the International Conference on Information Warfa;2010, p319 

    Game theory has been used to model several areas of information security like network security, intrusion detection, information warfare and security investment. We first survey the game theoretical approaches in these areas of information security. We then explore the role of game theory in...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics