We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Online keystroke attack proves tough to find

Stealthy hack serves malicious code only once

For example, a huge spam run with a Trojan horse program - one that looks harmless but isn't - is usually quickly detected by antivirus companies, which issue updates for their software to detect the malware.

However, the quantity of malicious code has moved security vendors to add other defenses to their software, such as the ability to detect when a new program is doing something suspicious, such as suddenly communicating with a remote server.

It wasn't immediately clear how many Wwebsites may be using this style of attack. However, Finjan said it's an example of how hackers are raising the bar to mask their attacks on computers and steal data, such as bank details.

"Large numbers of infected users means higher revenues for the attackers," Finjan said.

Get the latest on PC security threats, reviews and downloads here

IDG UK Sites

Sky to offer mobile phone contracts with O2: Will Vodafone make a move?

IDG UK Sites

Windows 10: a guaranteed success. Probably.

IDG UK Sites

Do we need to fight the government again over design and art education?

IDG UK Sites

How to make money selling books on the iBookstore, publish your book in Apple's book store