3.4+internet+Security+and+Threats

=3.4 Internet Threats and Security= [] low risk Virus Steals passwords || This article was about stealing passwords from gaming sites ||  ||   || Identity Theft "Pyramid Scheme" || This article is about the top 10 internet scams that have occurred, and it gives you information on how they do it, and what you should do to avoid it. || Everyone should read this one ||  || (Sdbot) || Its about how to detect malware || A bit technical, did you understand it all Xana! ||  || Intellectual Property || Setting up a copycat website to sell fake goods only takes a few seconds, according to a computer expert. || Worth reading ||  ||
 * Name || Article || Key words || Comment || Mr O ||  ||
 * Mr. O || [] || Windows based worm,
 * Bill || http://mashable.com/2012/02/21/anonymous-threat/ || Anonymous(a group of hackers mainly targeting the FBI, US government, Scotland Yard etc.) || This article was about how this group may be able to disable the US power grid in a few years. || Can it really happen, can hackers take donw the US power ||  ||
 * Arthur || http://www.internetthreat.org/2009/01/top-10-internet-scams.html || Phishing
 * Xana || [] || (Agobot) (Phatbot)
 * Jordan || [] || Counterfeit security certificatesCyber Security
 * SOH || [] || Malware, Trojan, Scareware, Spammers, Client Side Applications, Social Networks, Spot the fakes, Privacy Settings, Phishing, Wifi Danger, Prevention. || This article is very detailed with screenshots of examples. All kinds of Internet Threats. || Worth reading alot of information here ||  ||
 * sagar || [] || **Koobface, **
 * worms, **
 * zombie computers **
 * botnets ** || This articles tells us about a virus threat that turns your computer into a zombie using worms and botnets || Worth reading ||  ||
 * Safwan || http://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.html

http://www.informationweek.com/news/188703448 || Key words: Software bomb, company programs, code generators, antivirus programs, Antispyware programs, firewalls. || Malicious code- A software bomb destroyed all the companies programs and code generators. Due to this, the company lost millions of dollars and fell from their position in the market and had to lay off 88 employees. || Some good stuuf here also ||  || OS X 10.6 Snow Leopard PayPal Flashback.G Java malware || This article is about a new java Trojan that has been developed to target Mac computers and has proven that Mac computers are not secure from viruses and Trojans. || For Mr Wilson ||  || vulnerabilities update mechanisms data supplier || This article compares cybercrime to the Mafia. It talks about how it is organized and how it has evolved. The information comes from a report by a security company called Finjan || i liked this one ||  || Log files Hacked Malicious code || <span style="font-family: 'Calibri','sans-serif'; font-size: 16px;">This article is about Mobile users more vulnerable to e-mail phishing scams, as they are always on-line and can get messages any time. Mobile users are three times vulnerable to phishing than desktop users. And I phone users are eight times more vulnerable than blackberry users. || all smart phones users shoudl read this. ||  || <span style="color: #333333; font-family: 'Arial','sans-serif'; font-size: 13px;">"Man in the Browser" <span style="color: #333333; font-family: 'Arial','sans-serif'; font-size: 13px;">Banking security || <span style="color: #333333; font-family: 'Arial','sans-serif'; font-size: 13px;">This article was about hackers finding a new way of getting around latest online banking security devices. <span style="color: #333333; font-family: 'Arial','sans-serif'; font-size: 13px;">This type of hacking is called “man in the Browser” || Interesting as I use this device ||  || Phishing Rogue applications Adware Pop-up ads || This website article informs you of the 5 biggest internet threats and what they do. ||  ||   || Cyber Counterintelligence Dot.gov Domain Secure Network Solutions || It is about the security methods that they are going to use to stop attackes on American servers taht they consider vital. It also tackles online attackes and possible counterintelligence on the web. || Interesting thing here is that 80% of us anti cyber equipment is in private hands, not governmetn hands. ||  || Parental Control GPS Account hijacking Social Networking || It about children accessing the internet and parents being protective about their child's personal detail || "Help with homework" V "hot babes" quote. Real time alerts about what you child is surfing. ||  ||
 * pempho || http://www.pcworld.com/article/250693/flashbackg_trojan_targets_macs.html || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">Flashback Java Trojan
 * Joschka || [] || Commodities prime articles
 * Hussein || [] || <span style="font-family: 'Calibri','sans-serif'; font-size: 16px;">Phishing
 * Hassan Malida || [] || Malware <span style="color: #333333; font-family: 'Arial','sans-serif'; font-size: 13px;">PINS entry
 * Mahomed || [] || Spyware Identity theft
 * Lukas || [] || spear phishing || information found on the internet to personalize email to make them look genuine || Governments allow hackers to operate within thier terriorty ||  ||
 * Natasha || [] || **Cross-site scripting** (malicious web developer attaches a script to something sent to a web site, such as a URL and is transferred to your browser.)
 * Packet sniffing** (a program that captures data from information packets.) || How users at home are at risk of cyber crime and how information security is concerned with three main areas confidentiality, integrity, and availability. || Huge anout of good stuff here, have a look at this when you have time ||  ||
 * Edward || [] || Cybersecurity Cyber warfare
 * Hun || [] || Scanning Pairing