Hackers can control a PC without the knowledge of their owners
More and more ordinary computer users attacked dangerous viruses, and even the owners are unaware of this. This is the case, since Kandeys Lokler (Candace Locklear) a couple of weeks ago. She quietly worked in the office when her computer suddenly «get into a wax» and began to send letters to viruses all her colleagues. While she understood what did happen, several of its employees opened dangerous mail, by infecting their computers. To resolve the issue lasted 8 hours. The woman said that nothing pointed to the dangerous list, which makes it the computer itself. It is not certain that her car completely clean.
Such cases - are not uncommon. Computer security experts say that tens of millions of PCs infected with viruses, and their users about it does not even suspect. Some harmful programs record every stroke of the keyboard keys, and then transmit valuable information such as data bank accounts, passwords and credit card numbers, hackers. Others turn PCs into «zombie», literally passing the criminals have complete control over them. «Zombie» can act as servers that send thousands of spam messages, as the owner of the machine does not even suspect. Hackers can remotely change the text and sent to the volume of information.
Such an attack has recently undergone a company Monster Worldwide Inc., When about a month ago, millions of applikantov confidential information was stolen by criminals using «zombies».
Experts warn that such attacks difficult to capture, and the company together with the users must be vigilant, but have said that the situation with hackers - more than the worse. Nevertheless, it is necessary to adhere to basic safety rules, for example, to install the latest versions of antivirus software, which can be downloaded online, and protect their files this way.
Статьи по теме:
General characteristics of CybercrimeAt the market goes cheap GSM / GPS signaling Care home PC Integration Ibm Rational Clearquest and Microsoft Project - The key to successful planningWhat brings Sp1 For Windows Vista?Components, Modules, mamboty in CMS JoomlaThe funds protect your computer and maximum securityDesperate to know if he lies or fake? Development of Iron Industry Or Who Wanted Now Multi ProcessorsWAYS OF COMPUTER CRIMESGoogle on the Internet malicious softwareGreedy cabinet creators Spyware is testing! Soa-platform Ijanet FreeMaintenance of computers in the Framework for IT outsourcingData protection. Luxury or means of survival?Basics With VirtualdubHide your important documents, a computer in secondsAnimation on your computer deskTips and Tricks - Picasa willThreats to Security Modern NetworksIt is fake? Linux set in motion devices: Now in the marketMETHODS OF PROTECTION FROM COMPUTER VIRUSESEnabling Windows VistaRepair permissions for sluggish computerLock down the personal information on your computerSwitches NetGearThe story of software Escrow Active Desktop Windows XPMikrokontrolleryne SystemThe total points in the organization LANChanging the design desktopDevelopment of Software Development ProjectsThe company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan» What your child is doing online?Increases user rights Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questionsMemory management FreebsdDownload MozillaMs Word Vs NotepadWhat is the standard CompactPCI?Mobile Trade Optimum - Office Business RepresentativesConcentrators Fast Ethernet NetGearBest Antivirus PC Peripherals Integration modules PADS in the enterprise software environmentBlack Banner - History of discovery More WinRAR 3.70 RU FinalTerms of the need for backup devices Fraud Cell Phones Black Banner - or the threat of new technologies? Local bus The destruction of computer dataThe development of databases on Msde 2000, working with Free Database MssqlComputer data as an object of criminal assault