After Trojan Horses and worms, here comes the Beast

Monday, 20 October 2003, 11:43 AM EST

For a computer user, it is the ultimate security headache: A hacker has secretly taken control of the computer and copied sensitive information such as passwords and credit card numbers.

Users often think the odds of getting hit by malicious software are safely low, but there are more invasive and destructive programs on the Web than ever before, computer security specialists say.

In response to one of the latest attacks to become public, the United States Securities and Exchange Commission arrested a college student last week on charges that he hacked into someone else's computer, logged on to his brokerage account, and left the victim with an investment loss of more than US$40,000 (S$70,000).

The student allegedly used a version of the Beast - software that gave him control over the victim's computer.

[ Read more ]

Related items




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //