Latest (all topics)
Top stories
Daily round-up
Web site of the day
Gadget of the day
Video of the day
Innovations
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
BIOS Podcast #7: Cybercrime & Crimeware
 
Over the last 18 months, an ominous change has swept across the Internet. The threat landscape once dominated by the worms and viruses unleashed by irresponsible hackers is now ruled by a new breed of cybercriminals.

This BIOS Podcast provides an introduction to cybercrime and crimeware, and what you can do to prevent yourself from becoming a victim. It was kindly supplied by Symantec.

Cybercrime is motivated by fraud, typified by the bogus emails sent by ‘phishers’ that aim to steal personal information. The tools driving their attacks and fuelling the blackmarket are crimeware - bots, Trojan horses, and spyware.

The explosive growth of online fraud has made ‘phishing’, and to a lesser extent ‘pharming’ part of nearly every Internet user’s vocabulary during 2005. Phishing and pharming are two popular forms of fraud that aim to dupe victims into believing they are at a trusted Web site such as their bank, when in fact they have been enticed to a bogus Web site that intends to steal their identity and drain their financial resources.

While spyware has occupied centre stage of late, it is but one of the tools behind today’s rash of cybercrime. Deceptive Trojan horses, multi-purpose bots, and spyware programs form the crimeware arsenal of today’s hackers and are regularly bought and traded on the black market. The price tag of crimeware is often based on their ability to steal sensitive data such as bank and credit cards while remaining undetected by the victim.

To listen to the full interview, please click here. For more Podcasts, go to biosmagazine.co.uk/podcasts. Enjoy!




 
BIOS, Mar 02, 06 | Print | Send | Comments (0) | Posted In Security
Related Articles

Defending In Depth
Cyber Security & Other Games
Second Life, Second Identity?
Don't Choke In The Name Of Security
A Baker's Dozen Of Security Bytes
Patching Up Security
Webroot Software Spy Sweeper 5.3
PC Tools Spyware Doctor 4.0
How Cybercrime Operations Work
ZoneLabs ZoneAlarm Internet Security Suite 7

More...
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators