Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 NetApp Digital Newsroom HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

Malicious Malware: Six Ways Cybercriminals Beat Security

Cybercriminals have become adept at going around the latest security defenses. Here's a list of some of the most innovative malware in use today.

Back 1   2   3   ... 8 Next

photo
Stealing Banking Credentials



Crooks use to try to steer PC users to bank-lookalike Web sites to steal user names and passwords. Today, many criminals instead steal the credentials as users access genuine banking sites. To do that, hackers use key-logging malware in infected PCs. Such software records the keystrokes on a login page and sends the sequence to the fraudster's server. To defend against such malware, companies have introduced two-factor authentication using one-time passwords sent through a token device. Creative crooks have bypassed the added security through malware that collects login credentials, sends them in real time to a command and control server, and blocks the user for several minutes in order to give the fraudster time to access the site.

 
 
Back 1   2   3   ... 8 Next

sponsored resources