Blog Posts Tagged with "Trojans"
May 01, 2011 Added by:Global Knowledge
The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...
April 20, 2011 Added by:Headlines
Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...
April 15, 2011 Added by:Headlines
Researchers at have identified a Zeus Trojan variant accompanied by a signed digital certificate. The presence of a signed certificate from a legitimate CA makes the task of identifying and defending against the malware more difficult for antivirus software and file scanners...
April 01, 2011 Added by:Headlines
"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."
March 16, 2011 Added by:Simon Heron
The malware is able to wait until the victim has successfully logged on to their bank before inserting itself between the browser and the bank’s website and then invisibly transferring money to some individual who believes they are working for a legitimate company...
March 07, 2011 Added by:Headlines
The malware allows remote access of infected Blackberry devices by the attacker, who can then change the SMS message default number, add a new device administrator, control blocked call lists, and even turn the device on and off...
March 04, 2011 Added by:Headlines
"Kingsoft WebShield has the ability to lock the home page to a specific domain as well as to redirect URLs based entirely on plain text configuration files... a person with malicious intent can repackage it using malicious configuration files and use this as a home-made Trojan package..."
February 26, 2011 Added by:Bill Gerneglia
These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...
February 23, 2011 Added by:Headlines
"Another interesting feature of OddJob, which makes it stand out from the malware crowd, is its ability to bypass the logout request of a user to terminate their online session... the legitimate user thinks they have logged out, when in fact the fraudsters remain connected..."
February 08, 2011 Added by:Headlines
Nearly sixty percent of the infected computers scanned showed the presence of a Trojan, followed by the traditional virus at nearly thirteen percent, and what is classified as a worm at just under ten percent...
February 07, 2011 Added by:Headlines
Security firm Trusteer reports that a recent survey has revealed that an increasing number of websites are now known to host Zeus variants. The report also shows that a growing number of networks are hosting command and control operations for Zeus-based botnets...
January 20, 2011 Added by:Headlines
The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...
January 19, 2011 Added by:Rafal Los
Whether you're installing a drive-by trojan malware via 0day, collecting revenue from pay-per-click schemes, or XSS'ing your way into their bank account - the goal of this game is to make money on that person. Let's face it, business is good...
January 18, 2011 Added by:Headlines
Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...
January 03, 2011 Added by:Dan Dieterle
Geinimi is capable of receiving commands from remote servers controlled by hackers, this botnet-style functionality together with the use of code obfuscation techniques leads mobile security firm Lookout to describe the malware as the most sophisticated to appear on Android devices to date...
December 31, 2010 Added by:Robert Siciliano
Zeus is designed to steal bank account login credentials. It has traditionally targeted PCs, but has now been updated to attack cell phones as well, with one version of the malware intercepting SMS confirmations sent by banks to customers, and defeating the fund transfer authorization codes...
What PCI Requirements Apply to Us: Tacking a... Sarah James on 10-21-2014
Why Are We Failing at Software Security?... Sarah James on 10-21-2014
Join the Security Intelligence Network on Li... Leo nardz on 10-21-2014