Blog Posts Tagged with "Trojans"

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Did You Get the FakeRean Windows Virus?

May 01, 2011 Added by:Global Knowledge

The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

A Brief History of Smartphone Insecurity

April 20, 2011 Added by:Headlines

Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Accompanied by Signed Digital Certificate

April 15, 2011 Added by:Headlines

Researchers at have identified a Zeus Trojan variant accompanied by a signed digital certificate. The presence of a signed certificate from a legitimate CA makes the task of identifying and defending against the malware more difficult for antivirus software and file scanners...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Financial Trojans: Following the Money

March 16, 2011 Added by:Simon Heron

The malware is able to wait until the victim has successfully logged on to their bank before inserting itself between the browser and the bank’s website and then invisibly transferring money to some individual who believes they are working for a legitimate company...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Migrates to Blackberry OS

March 07, 2011 Added by:Headlines

The malware allows remote access of infected Blackberry devices by the attacker, who can then change the SMS message default number, add a new device administrator, control blocked call lists, and even turn the device on and off...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Trojan Utilizes Modified Security Solution Code

March 04, 2011 Added by:Headlines

"Kingsoft WebShield has the ability to lock the home page to a specific domain as well as to redirect URLs based entirely on plain text configuration files... a person with malicious intent can repackage it using malicious configuration files and use this as a home-made Trojan package..."

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Thirty Percent of EU Internet Users Affected by Worm in 2010

February 26, 2011 Added by:Bill Gerneglia

These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OddJob Trojan Prevents Online Banking Session Termination

February 23, 2011 Added by:Headlines

"Another interesting feature of OddJob, which makes it stand out from the malware crowd, is its ability to bypass the logout request of a user to terminate their online session... the legitimate user thinks they have logged out, when in fact the fraudsters remain connected..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Half of All Computers Infected with Malware

February 08, 2011 Added by:Headlines

Nearly sixty percent of the infected computers scanned showed the presence of a Trojan, followed by the traditional virus at nearly thirteen percent, and what is classified as a worm at just under ten percent...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Variants Infesting More Websites

February 07, 2011 Added by:Headlines

Security firm Trusteer reports that a recent survey has revealed that an increasing number of websites are now known to host Zeus variants. The report also shows that a growing number of networks are hosting command and control operations for Zeus-based botnets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bohu Trojan is Designed to Disable Cloud Antivirus

January 20, 2011 Added by:Headlines

The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Will IPv6 Cause Chaos for the Browsing Public?

January 19, 2011 Added by:Rafal Los

Whether you're installing a drive-by trojan malware via 0day, collecting revenue from pay-per-click schemes, or XSS'ing your way into their bank account - the goal of this game is to make money on that person. Let's face it, business is good...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PDFs Now Leading Source of Malware Attacks

January 18, 2011 Added by:Headlines

Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Trojan Most Sophisticated Ever Found

January 03, 2011 Added by:Dan Dieterle

Geinimi is capable of receiving commands from remote servers controlled by hackers, this botnet-style functionality together with the use of code obfuscation techniques leads mobile security firm Lookout to describe the malware as the most sophisticated to appear on Android devices to date...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are You Protected From Zeus?

December 31, 2010 Added by:Robert Siciliano

Zeus is designed to steal bank account login credentials. It has traditionally targeted PCs, but has now been updated to attack cell phones as well, with one version of the malware intercepting SMS confirmations sent by banks to customers, and defeating the fund transfer authorization codes...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked