Coming to your PC's back door: Trojans

Thursday, 26 January 2006, 2:05 PM EST

Targeted Trojans are key because they bypass most antivirus software and entice the recipient to believe the e-mail transmitting the Trojan is legitimate. The damage spreads because once a PC is infected with remote-control software, becoming what's known as a Zombie, it often remains undetected by users.

At NewsFactor.

[ Read more ]




Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //