The rogue security product attempts to scare users with fake infection warnings and pesters them into paying money for fake protection.
Articles by Kara Reeder
Microsoft's architecture is a more flexible approach to establishing a user's identity.
Hackers are using the worm to build a botnet that steals data, including online banking credentials.
Opening all attachments and e-mail messages from strangers is a sure-fire way to provide thieves with personal information and financial data.
Experts agree that the most at risk are the nation's power grids, transportation systems, telecommunications, financial institutions and health network.
The investment 'will extend FireEye's cyber security product development and stealth malware technical capabilities.'
Authorities believe the Trojan was configured to steal victim's online bank account information.