360 Security Center Released: This week, the Security Center to monitor the "fishing" site complaints are magnified trend, and the means of renovation, more secretive behavior. After investigation, in addition to the common use of similar web sites to entice users to log in and steal their passwords, using a message claiming to come from a major company, allowing you to click on a malicious web link to steal your password and other privacy information is also spreading. Experts remind, in the receipt of unknown mail must be carefully screened to prevent the recruit.
It is reported that the network "fishing" has always been a malicious means in the network, its various ways disguised as a regular network service providers to defraud the victim's account password and other privacy information. Phishing attacks through the way, can be said to be impossible, as long as you do not pay attention to click, the past may be a full of trojans or malicious code site. The difference induces you to enter your account information on a fake web page the traditional "fishing" means is a step closer to stealing information by clicking on it.
Recently, PayPal chief technology officer Scott Thompson said in an interview: "If you have an e-mail account, you may have encountered a claim from PayPal mail, visible phishing attacks are very common." Now many banks or securities businesses on the Internet are often related to e-mail addresses, and if phishing or identity-seekers get the e-mail addresses you use to register the business, that would be a scary thing.
Experts in this regard to the vast number of netizens:
First, the registration of online banking and other important business, it is best to use a separate mailbox, do not casually published.
Second, some companies will be digitally signed to check whether the sender of the mail, you need to upgrade the version of IE browser to identify verification, such as IE7 or firework.
Third, through the 360 guards to repair the system loophole, opens the real-time webpage to prevent the leak and the Fishing website interception function.
Be sure to open the URLs and emails you receive.
"Key Trojan Broadcast"
Trojan Name: Backdoor/win32.agent.ahj
Trojan Type: Backdoor Trojan
Harmful behavior: Trojan running after the derivation of virus files to the system directory, and delete itself, modify the registry, new services, and to serve the way to achieve the goal of random start.
Transmission channel: Network Transmission, U disk
Victims Group: 4.8 million
Trojan Name: TROJAN-PSW/WIN32.DELF.WH
Trojan Horse Type: Stolen Number Trojan
Harmful behavior: Steal information from the computer, including game account password, etc.
Transmission channel: Network communication
Victims Group: 880,000
Trojan Name: trojan/win32.agent
Trojan Type: Trojan Horse
Harmful behavior: Automatic to QQ friends to send virus files, and the size of the virus files, send the virus file name has a certain temptation
Transmission channel: Network communication
Victims Group: 450,000
Trojan Name: W32/FUBALCA.D
Trojan Type: Trojan Horse
Hazard Behavior: Modify registry, create process, inject virus code
Transmission channel: Network communication
Victims Group: 340,000
Trojan Name: Trojan/popwin
Trojan Type: Trojan Horse
Hazardous behavior: After the Trojan runs, modify the registry, to achieve the power-on from the startup. Timed pop-up advertisement window, interference user normal operation.
Transmission channel: Network communication
Victims Group: 300,000
Trojan Name: W32/pifio
Trojan Type: Trojan Horse
Hazardous behavior: Resident memory, variable virus. Infected EXE files, also through the mapping drive and network sharing spread.
Transmission channel: Network communication
Victims Group: 100,000
Trojan Name: Trojan/win32.onlinegames.ny
Trojan Type: Theft Trojan Hazard behavior: Trojan running after the derivation of Trojan files, steal user network game accounts and passwords.
Transmission channel: Network communication
Victims Group: 80,000
Trojan Name: TROJAN-DOWNLOADER/WIN32.SMALL.EWY/EJW
Trojan type: Trojan download
Harmful behavior: Automatic download, the virus runs automatically from the designated Web site to download the backdoor program to run.
Transmission channel: Network communication
Victims Group: 60,000
Please contact the site, timely note your name, contact email: Post@chinaz.com.