After Trojan Horses and worms, here comes the Beast

Monday, 20 October 2003, 11:43 AM EST

For a computer user, it is the ultimate security headache: A hacker has secretly taken control of the computer and copied sensitive information such as passwords and credit card numbers.

Users often think the odds of getting hit by malicious software are safely low, but there are more invasive and destructive programs on the Web than ever before, computer security specialists say.

In response to one of the latest attacks to become public, the United States Securities and Exchange Commission arrested a college student last week on charges that he hacked into someone else's computer, logged on to his brokerage account, and left the victim with an investment loss of more than US$40,000 (S$70,000).

The student allegedly used a version of the Beast - software that gave him control over the victim's computer.

[ Read more ]

Related items




Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //