tailieunhanh - Ethical hacking and countermeasures - phần 59

Tham khảo tài liệu 'ethical hacking and countermeasures - phần 59', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | c E H Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module LIX How to Steal Passwords IM c E H News Certified Ethical Hacker WoW password stealing worm and YouTube video playing trojan Posted on digg V redd it stumble this The list of the most active malware this weekis headed by two variants of the Bagle worm. The Comet adware which shows ads to users through banners pop-ups etc comes in third place. Regarding new strains of malware that have appeared this week the PandaLabs report focuses on the Trojan and the and worms. EC-Council The Trojan spreads in emails with the subject A Pessoa com Ũ fvlaior Rabo do Mundo and contains a text in Portuguese and a link to a video. However if the user clicks the link they will actually be downloading a copy of the Trojan onto their computers. Then the Trojan plays a YouTube video to conceal its actions. Also this malicious code downloads two banker Trojans onto the computer to steal login data for accessing various banking entities services. Source http ECC All Rights Reserved. Reproduction is Strictly Prohibited IM c E H News Certified Ethical Hacker Virus Stealing Bank Passwords 12 January 2008 BBC News is reporting about a stealthy Windows virus that steals login details for online bank accounts In the last month the malicious program has racked up about 5 000 victims - most of whom are in Europe Many are falling victim via booby-trapped websites that use vulnerabilities in Microsoft s browser to install the attack code. The malicious program is a type of virus known as a rootkit and it tries to overwrite part of a computer s hard drive called the Master Boot Record MBR . This is where a computer looks when it is switched on for information about the operating system it will be running Once installed the virus downloads other malicious programs such as keyloggers to do the work of stealing .

TỪ KHÓA LIÊN QUAN