eyeimWith the recent release of Mac’s Snow Leopard and the upcoming Windows 7, it’s  only natural that hackers gave their viruses an upgrade as well. According to security company RSA, the Zeus trojan virus now employs the use of instant messaging. After the Zeus trojan has gotten a hold of someone’s account, a hacker will automatically receive an instant message notifying him that that his hack was successful.

Once installed on a PC, the Zeus virus sends the hacker the user’s log-in information and passwords. Then a module, that can be applied to the virus, can search for information specifically concerning financial institutions. A security company called Damballa estimates that the number of PCs that have been infected with the virus are currently at around 3.6 million,  making the Zeus Trojan one of the most aggressive invasive malware viruses around.

Read More →

twitter_hack3As social networking sites like Facebook and Twitter become more popular with the public, they also become more popular with internet hackers. Recent studies conducted by Breach Security showed that social networking sites were responsible for at least 19% of internet hack attacks in 2009. Just last week, an employee of  Arbor networks, Jose Nazario, discovered an attempt by attackers to use Twitter as a command and control to send instructions to infected computers. Twitter messages are being used to send out new download links, which in turn downloads a password-stealing Trojan known as Infostealer.Bancos.

Aside from Trojan, a popular malware installing virus called Koobface worm continues to wreak havoc on Facebook. A report from Kaspersky Lab shows that these malware attacks are ten times more effective than those sent through email. The important lesson to be learned here is that attackers are going to follow more users as these social network sites continue to grow rapidly. This provides serious risks for users who share too much of their private details out on these sites. Posting information such as home addresses, exact locations, and even telephone numbers are not the smartest things to do when site defenses are potentially so weak.

Read More →