wants you to stay informed!
Check out these
noteworthy articles from:
By TOM ZELLER Jr.
Published: February 27, 2006
But there is evidence that among global cybercriminals, phishing may already be passé.
In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con — the use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks. These programs are often hidden inside other software and then infect the machine, putting them in the category of malicious programs known as Trojan horses, or just Trojans.
Two weeks ago, Brazilian federal police …. To read the rest of this article, click here.
TOM ZELLER Jr.
Published: February 27, 2006
That's reason enough to keep up to date with operating system patches, invest in a solid antivirus program and use a basic firewall. But even with those measures in place, malicious code — including a keylogger — can sometimes find its way onto your computer.
"There are plenty of ways to …. To read the rest of this article, click here.
Published: December 19, 2005
Weeks before, Justin had hooked up a Web camera to his computer, hoping to use it to meet other teenagers online. Instead, he heard only from men who chatted with him by instant message as they watched his image on the Internet. To Justin, they seemed just like friends, ready with compliments and always offering gifts.
Now, on an afternoon in 2000…. To read the rest of this article, click here.