Follow on Google News News By Tag * Ransom Trojan * F-secure * Trojan.Generic.KDV.153863 * Activation * Windows * Information Security * Trojan * Security * Internet * More Tags... Industry News News By Place Country(s) Industry News
Follow on Google News | Security Researchers Alert Users on New Ransom TrojanRecently, security researchers at F-Secure warned users of a new Ransom Trojan.
By: EC-Council When unwary users click on the next button to proceed with the activation, they are directed to another window. The message in the window states that activation is not allowed through Internet and Short Message Service (SMS). Users are required to call on any of the several contact numbers provided to receive the installation code. Targeted users are tricked to make the call by stating that all calls are free. According to F-Secure, the provided numbers are registered in different countries such as Denmark, Madagascar and, São Tomé and Principe (located in the Gulf of Guinea). However, the calls are chargeable and quite expensive. Attackers use short stopping technique, wherein rogue operators redirect expensive calls to cheaper countries. According to security researchers at F-Secure, the activation key is provided after completing three minutes of the call. Users receive the same code, each time they call on the provided numbers. Growing number of threats in the cyberspace has made it inevitable for IT professionals to constantly upgrade their skills through e-learning and online technology degree programs. Internet users must install and regularly update anti-virus and anti-malware programs to safeguard their computer systems and information stored on them. They must also keep track of the security advisories from software developers, browser vendors and Internet security firms and update programs regularly. Online computer degree programs in cyber security could help users and employees to understand various online security threats and best practices. Information security has become critical issue for individuals and organizations alike. Business organizations, government bodies, IT security firms, software developers and vendors of security products are all faced with the constant challenge of improving the IT security environment. Rising instances of online crime has resulted in increased demand for cyber security professionals qualified in penetration testing, IT masters degree, incident management, computer forensics, programming, system administration, network administration and security audit. Contact Press EC-Council Website: http://www.eccuni.us Email: iclass@ Tel: 505-341- EC-Council University is based in Albuquerque, New Mexico and offers Master of Security Science (MSS) degree to students from various backgrounds such as graduates, IT Professionals, and military students amongst several others. The MSS is offered as a 100% online degree program and allows EC-Council University to reach students from not only the United States, but from all around the world. EC-Council is a member-based organization that certifies individuals in cybersecurity and e-commerce skills. It is the owner and developer of 16 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT). Its certificate programs are offered in over 60 countries around the world. EC-Council has trained over 80,000 individuals and certified more than 30,000 members, through more than 450 training partners globally. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. federal government via the Montgomery GI Bill, Department of Defense via DoD 8570.01-M, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates the global series of Hacker Halted security conferences. # # # iClass is EC- Council's online training delivery platform. Students can attend live, or recorded training sessions for courses such as Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA) or Computer Hacking Forensic Investigator (CHFI). End
Account Email Address Disclaimer Report Abuse
|
|