trojans

Visit/security/30081/what-is-a-trojan-virus
Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
15 Jun 2020
Visit/security/trojans/355479/four-steps-to-exterminating-rats-controlling-your-computer
trojans

Four steps to exterminating RATs controlling your computer

Unless actively pursued, damaging remote access trojans have the ability to live years undetected
29 Apr 2020
Visit/security/trojans/355446/decade-of-the-rats-remote-access-trojans
Whitepaperwhitepaper

Decade of the RATs - remote access trojans

Cross-platform APT espionage attacks targeting Linux, Windows and Android
27 Apr 2020
Visit/security/trojans/355445/decade-of-the-rats-remote-access-trojans
Whitepaperwhitepaper

Decade of the RATs - remote access trojans

Cross-platform APT espionage attacks targeting Linux, Windows and Android
27 Apr 2020
Advertisement
Visit/security/malware/355434/threat-groups-relying-on-trojanized-apps-to-spread-surveillanceware
malware

Threat groups relying on trojanized apps to spread surveillanceware

Apurva Kumar shows how Monokle is spreading its surveillanceware
24 Apr 2020
Visit/security/trojans/354242/national-crime-agency-brings-down-prolific-trojan-marketplace
Trojan
trojans

National Crime Agency brings down prolific Trojan marketplace

Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Visit/trojans/34368/stealthfalcon-malware-spread-through-the-windows-update-mechanism
Trojan
trojans

Malware spread through the Windows update mechanism

By using the Windows update delivery system, the malicious traffic of this trojan can evade firewalls
10 Sep 2019
Visit/malware/32337/trickbot-now-uses-microsoft-excel-to-steal-passwords-and-web-browser-data
The Microsoft Excel app on a mobile phone with headphones plugged in
malware

Trickbot now uses Excel to steal passwords and browser data

The banking trojan has pivoted from stealing victims’ financial details to credentials and web history
12 Nov 2018
Advertisement
Visit/malware/31106/malware-hiding-android-apps-return-to-google-play-after-a-simple-name-change
malware

Infected Android apps back on Google Play after name change

Symantec discovers seven malicious apps sneaked back onto Google Play with different names
14 May 2018
Visit/digital-currency/30516/cryptocurrency-miners-the-latest-tool-for-cyber-criminals
digital currency

Cryptocurrency miners: the latest tool for cyber criminals

Learn more about the new form of cyber crime that is being driven by cryptocurrency fever
13 Feb 2018
Advertisement
Visit/cyber-attacks/30487/76-of-local-government-organisations-suffered-a-cyber-attack-in-the-past-year
cyber attacks

76% of local governments suffered a cyber attack in 2017

Many IT professionals are unsure how to combat the rise in attacks
8 Feb 2018
Visit/security/29376/free-trojan-kit-includes-a-backdoor-that-spies-on-hackers
Security

Free Trojan kit includes a backdoor that spies on hackers

The flaw allows a single author to wrestle control of infected systems away from hackers
1 Sep 2017
Visit/security/trojan/28535/cardinal-rat-went-unnoticed-for-two-years
Security

Cardinal RAT went unnoticed for two years

Remote access Trojan used malicious Excel macros to infect systems
21 Apr 2017
Visit/android/27855/wi-fi-hijacker-trojan-masquerades-as-android-apps
Hackers
Google Android

Wi-Fi hijacker Trojan masquerades as Android apps

Switcher Trojan can hack your router's DNS requests
4 Jan 2017
Advertisement
Visit/security/24803/dropper-realshell-shows-malware-devs-are-getting-smarter
Security

Dropper RealShell shows malware devs are getting smarter

The Android Trojan dropper can avoid existing defences to install malicious files on Android devices
16 Jun 2015
Visit/security/24338/energy-companies-targeted-by-laziok-trojan
Hacker
Security

Energy companies targeted by Laziok Trojan

Malware enters infrastructure, then sends in more advanced viruses to carry out attacks
2 Apr 2015
Visit/security/23587/regin-malware-used-in-attacks-since-2008-symantec-research-finds
Malware
Security

Regin malware used in attacks since 2008, Symantec research

Newly-discovered complex malware could be state-sponsored, researchers claim
24 Nov 2014
Visit/security/23576/uk-clampdown-on-pc-hijackers-prompts-four-arrests
Arrest
Security

UK clampdown on PC hijackers prompts four arrests

NCA-led initiative to stop users of Remote Access Trojans results in multiple arrests
21 Nov 2014
Visit/security/23358/fake-who-email-about-ebola-spreads-malware
Click here for malware
Security

Fake WHO email about Ebola spreads malware

Advice email from “World Health Organization” harbours its own virus
24 Oct 2014
Visit/malware/23289/android-trojan-poses-as-game-of-noughts-and-crosses
malware

Android Trojan poses as game of noughts and crosses

Goaml malware steals text messages and emails
14 Oct 2014
Advertisement
Visit/malware/23268/selfmite-android-malware-returns-bigger-badder
Mobile malware
malware

Selfmite Android malware returns, bigger & badder

Sending out more text messages and making more money for hackers
10 Oct 2014
Visit/malware/22407/eset-uncovers-first-android-file-encrypting-piece-of-ransomware
malware

ESET uncovers Android file-encrypting piece of ransomware

Android/Simplocker malware allows hackers to hold users' devices to ransom
5 Jun 2014
Visit/645544/malwarebytes-warns-users-of-certified-banking-trojan
Malwarebytes logo
Security

Malwarebytes warns users of ‘certified’ banking Trojan

Security vendor sounds alarm over emergence of new password-stealing Trojan.
6 Feb 2013