Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cyber Resilience Zone HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 NetApp Digital Newsroom The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

Malicious Malware: Six Ways Cybercriminals Beat Security

Cybercriminals have become adept at going around the latest security defenses. Here's a list of some of the most innovative malware in use today.

Back 1 ... 2   3   4   5   6   ... 8 Next

photo
Man In The Browser



Most people are careful about e-mails requesting a large amount of personal data. People are less guarded when requests originate from a genuine bank Web site. Man-in-the-browser malware waits for the PC user to login to an employee VPN site or online banking site and then injects an HTML page that asks for additional credential information for "security reasons." Once the fraudsters have this information, they're free to impersonate the victim.

 
 
Back 1 ... 2   3   4   5   6   ... 8 Next

sponsored resources