• Many organizations use a fast-flux network of shells, making it harder to track malicious Web traffic to its source.

    CNN: Fighting the agents of organized cybercrime

  • This left users running Java on Windows, Mac and even Linux opened to being hacked by simply visiting a malicious web page.

    FORBES: Time To Update Java - Or Disable It!

  • For those tracking the growing malicious elements on the Web, Chrome's innovation--and GreenBorder's contribution to the open-source browser--is a technology known as "sandboxing, " a tactic that limits Web applications' access to a computer's memory beyond a virtual border.

    FORBES: The Web's Edge

  • "This additional level of protection when it comes to Safari users running Flash is good to see - as Adobe's software is so frequently exploited by malware authors and malicious hackers to infect web surfers, " said Graham Cluley, senior consultant at security firm Sophos in his blog.

    BBC: Apple releases Flashback patch for older OS

  • Web-based malicious software, unlike other malware, is designed to implant itself on users' machines when they visit a certain Web site.

    FORBES: Magazine Article

  • Web exploits and malicious email are two key infection vectors for malware.

    FORBES: 8 Steps To Keep Your PCs Safe From Online Criminals

  • DDoS is where large numbers of computers, under malicious control, overload their target with web requests.

    BBC: Keyboard

  • By the time the good guys had shut down Web sites hosting Sobig's malicious code at Geocities, Sobig already had gone through a sixth version.

    FORBES: Companies, People, Ideas

  • While the definition is ever expanding, cross script scripting (XSS) attacks are generally considered a type of injection problem where malicious input is injected into an otherwise trusted web page causing an unexpected behavior such as sending data to or from an unknown third party web site (cross site).

    FORBES: Security Firm F-Secure Has Security Flaw In Web Site

  • One reason that the phishers' tactics are increasingly effective: Instead of directly asking for bank account information in scam e-mails or on Web sites, cybercriminals are using hidden malicious software downloaded to users' desktops that monitors their online activities and records bank codes, Litan says.

    FORBES: Future Phishing

  • Microsoft found evidence that 70, 000 of the web domains overseen by 3322.org were malicious.

    BBC: Chinese cybercrime site cleans up

  • Web advertising could be an easy avenue for installing those malicious programs.

    FORBES: Future Phishing

  • These "zombies" are turned to a variety of malicious purposes, ranging from participating in denial of service attacks on Web sites to generating huge batches of spam e-mail.

    FORBES: Ten Must-Read Tech Stories

  • There is also the web control element to endpoint security, which protects users from malicious webpages, phishing links and sets up a time frame from leisure use of computers during non-working hours.

    FORBES: Russia's Kaspersky Lab Guns For Japan's Trend Micro

  • Over the past several weeks, researchers have tracked a hacker exploit that's infected more than half a million pages around the Web, invisibly redirecting visitors to those pages to servers that install malicious software on their PCs.

    FORBES: Magazine Article

  • The search engine's Web-crawling spider now keeps an eye out for viruses and malware as it combs the Web, and shows users a warning page before allowing them to access malicious sites.

    FORBES: Made For Hacking

  • Along with its web address analysis products, Dasient has also created a service that can hunt down malicious online advertising to protect the ads and content of customer websites.

    FORBES: Twitter Acquires Web Security Firm Dasient

  • On July 8, tech heavyweights including Microsoft, Cisco Systems and Sun Microsystems teamed up to fix a fundamental flaw in the Internet, one that could allow any Web user to be invisibly redirected to fraudulent sites designed to steal banking passwords or install malicious software on users' PCs.

    FORBES: Magazine Article

  • In addition to data-intensive web applications, Shalom sees applications like fraud detection, 3-D animation, and blocking malicious software as some of the beneficiaries.

    FORBES

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定