Exploding bank code
Security firm Trend Micro has released a report on the security situation in the third quarter of 2013, notably the explosion of malicious code related to online banking.
Security firm Trend Micro has released a report on the security situation in the third quarter of 2013, notably the explosion of malicious code related to online banking.
According to Trend Micro on November 25, the bank is one of the most strongly affected by Trojans and malware. Experts say that malware related to online banking is growing rapidly not only in Europe and America but also across the globe.
It is estimated that by the end of the third quarter of 2013, the amount of malicious code related to online banking has exceeded 200,000 - this is the highest infection rate since 2002.
The report also pointed out that hackers are expanding to fake Apple's website, which leads users to make online transactions to steal personal information. It is estimated that security experts have discovered 4,100 fake Apple websites.
Trend Micro also announced the creator of a malicious exploit for BlackHole Exploit Kit under the name Paunch . BlackHole Exploit Kit is a toolkit that uses Java vulnerabilities to attack computers.
However, Paunch is not the only hacker exploiting the Java vulnerability . Previously, the Neutrino Exploit Kit toolkit also used this method. One reason Java has a flaw is that Oracle developer has stopped supporting Java 6, so it is easy to be attacked by hackers.
You should read it
- Web7: XSS Exploits – Part 1: Reflected XSS
- Web6: SQL Injection - Some Exploit Tools
- Web3: SQL injection - Exploit directions
- Web2: SQL Injection - Other Exploits
- Find bug in Emotet malware, prevent it from spreading for 6 months
- Enhance Windows 10 security with Exploit Protection
- Web8: XSS Exploits - Part 2: Stored XSS
- Web9: XSS Exploits - Part 3: Dom Based XSS
- Microsoft warned about malicious spam campaigns using vulnerabilities in Office and Wordpad
- Stolen bank account with Trojan Banking
- Web4: SQL injection - Exploitation steps
- Adblock Plus filter can be exploited to run malicious code
Maybe you are interested
The most 'difficult to eat' shrimp on the planet, can live in water as hot as 450 degrees Celsius How to handle when your computer has an application not found error Why is the minimum air conditioner copper pipe length 3m? The AI chip has 20 times more power than Nvidia H100 4 online mindmap tools to draw mind maps online How to Connect Macbook Air to Monitor