We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Online keystroke attack proves tough to find

Stealthy hack serves malicious code only once

For example, a huge spam run with a Trojan horse program - one that looks harmless but isn't - is usually quickly detected by antivirus companies, which issue updates for their software to detect the malware.

However, the quantity of malicious code has moved security vendors to add other defenses to their software, such as the ability to detect when a new program is doing something suspicious, such as suddenly communicating with a remote server.

It wasn't immediately clear how many Wwebsites may be using this style of attack. However, Finjan said it's an example of how hackers are raising the bar to mask their attacks on computers and steal data, such as bank details.

"Large numbers of infected users means higher revenues for the attackers," Finjan said.

Get the latest on PC security threats, reviews and downloads here

IDG UK Sites

Best Christmas 2014 UK tech deals, Boxing Day 2014 UK tech deals & January sales 2015 UK tech...

IDG UK Sites

Chromebooks: ready for the prime time (but not for everybody)

IDG UK Sites

Hands-on with Sony's latest smartglasses

IDG UK Sites

Apple TV expert tips: get US Apple TV content, watch Google Play, use multiple Apple IDs and more