After Trojan Horses and worms, here comes the Beast

Monday, 20 October 2003, 11:43 AM EST

For a computer user, it is the ultimate security headache: A hacker has secretly taken control of the computer and copied sensitive information such as passwords and credit card numbers.

Users often think the odds of getting hit by malicious software are safely low, but there are more invasive and destructive programs on the Web than ever before, computer security specialists say.

In response to one of the latest attacks to become public, the United States Securities and Exchange Commission arrested a college student last week on charges that he hacked into someone else's computer, logged on to his brokerage account, and left the victim with an investment loss of more than US$40,000 (S$70,000).

The student allegedly used a version of the Beast - software that gave him control over the victim's computer.

[ Read more ]

Related items




Spotlight

Proactive real-time security intelligence: Moving beyond conventional SIEM

Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Aug 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //