Welcome!

Linux Containers Authors: Elizabeth White, Carmen Gonzalez, Yeshim Deniz, Sematext Blog, Liz McMillan

News Feed Item

New Internet Threats Target Millions Engaged in Banking Online

BOULDER, Colo., Aug. 27 /PRNewswire/ -- An estimated 98 million Americans bank online, thanks to Web-based bill-paying, money transfers and other activities made possible by financial institutions and service providers. The convenience of completing these tasks at home helps simplify hectic schedules and provides customers with 24-hour account access.

(Photo: http://www.newscom.com/cgi-bin/prnh/20090827/NYFNSF01)

Although financial institutions have security measures in place to protect their customers, cybercriminals have devised ways to circumvent some of these security devices. One tactic is to attack a bank customer's computer with a technique called keystroke logging (or just keylogging), which puts both your identity and your finances at risk.

Internet security firm Webroot reports that cybercriminals are churning out new variants of malware programs designed to log keystrokes at an increasing rate. One such program is called Zbot, which can activate while the owner of an infected PC is browsing a financial institution's Web site. In recent months, Webroot's Threat Research Lab has detected a steady increase in the incidents of Zbot. The program - and others like it - can not only record what a person types, such as the bank account username and password, but can also steal the responses to "security questions" the bank might ask. Some versions of Zbot can take pictures of the screen whenever the bank customer clicks his mouse, which defeats even "soft" on-screen keyboards that some banks use specifically to thwart keyloggers.

"Online banking sites are tempting and potentially very lucrative channels for cybercriminals to target a great mass of people," said Mike Kronenberg, chief technology officer for Webroot's consumer security division. "We're seeing malware authors rapidly update their banking Trojan programs in an effort to avoid detection by Internet security solutions. This means consumers need to stay on top of protecting themselves online."

Kronenberg recommends three key steps for protecting your personal finances and your identity online:

Be Protected: Make sure you have a reputable antispyware and antivirus program installed on your computer. Be careful when doing searches for "free" antivirus software because the results are often decoys that have malicious programming built in to them.

Stay Protected: Suppress the urge to hit the ignore button when you get those pesky reminders asking if you would like to check for updates. By having the most up-to-date software for both your operating system (like Windows or Linux) and your antispyware and antivirus program, you get the highest level of security.

Diversity is key: Would you ever use the same key for your car, office and your home? Although it may seem simplest to just use the same password for all your online accounts, it is perhaps the riskiest thing you can do to open yourself up to identity theft. If just one of your accounts is hacked it opens the door for the thief to gain access to all of them.

SOURCE Webroot Software

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
OpsRamp is an enterprise IT operation platform provided by US-based OpsRamp, Inc. It provides SaaS services through support for increasingly complex cloud and hybrid computing environments from system operation to service management. The OpsRamp platform is a SaaS-based, multi-tenant solution that enables enterprise IT organizations and cloud service providers like JBS the flexibility and control they need to manage and monitor today's hybrid, multi-cloud infrastructure, applications, and wor...
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...