![]() ![]() |
|
Threats to users via Trojan remote access programs are highlighted today by the SANS Institute. Typically the malware is loaded onto the users machine by downloading itself from a maliciously created website. The user ends up on the site after clicking on a link to a web based greeting message. The SANS Institute has noted an increased use of this type of attack. They will continue to monitor the situation. Types of software that can be installed include key-logging software. Criminals could then remotely control these to obtain usernames and passwords. |
|
Networks Bestsellers
The bestselling books on Amazon.
Articles
Lucent Offering Vulnerability Scanning
Intel Expands Telecom Offering
Agilent Claims Comprehensive Network Testing
Other Related Websites
Security
Internet
Risk Management