Those are the names of few of the many trojans you could unhappily have on your computer.
They mostly speak Russian and work this way: they send a real-time stream of your actions using a modified version of standard instant messaging software.
The hackers log into ( for example)your bank account, quickly copying the one-time password if one is used.
They start initiating wire transfers to accomplices (mules is the term of art) who send the funds on to the crooks.
Sometimes they have even set up “mules” or fake employees who earn fat salaries by direct deposit.
Passwords still protect against less sophisticated forms of password phishing, not to mention people just looking over your shoulder as you log onto your computer. Moreover, if you can keep your computer clean of malware by avoiding suspicious e-mail attachments and Internet downloads, you are safer.
"But there is nonetheless a race to find an even more secure way to keep the big bucks safe. One way is what is called two-channel authentication, using something other than the computer — most likely a cellphone — as part of the log-on procedure. That’s a good idea, but you know the hackers are already working out how they will attack those phones as well."
Friday, August 21, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment