Hands-on Project 1-1
Search for videos on RSS
Tutorial video on RSS found on Youtube
Screenshot of Security Incite viewed from Google Reader
Screenshots of the article found on other website
(because i couldn't find any article which i think is related to today's security attack on the given website)
Source : http://www.sans.org/top-cyber-security-risks/summary.php
-------------------------------------------------------------------------------------------------
Summary
-------------------------------------------------------------------------------------------------
Summary
A user may just download a simple programme that seems harmless to the computer, but in actual fact the programme may contain concealing malware like trojan horses. And when the programme is being installed, the trojan horse will scan the computer for information like password or credit card numbers and transmit it to a third party. Therefore causing the user's private information to be leaked out without having the user's acknowledgment.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home