trojans

What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
18 Nov 2020
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020
Qbot malware surges into the top-ten most common business threats
trojans

Qbot malware surges into the top-ten most common business threats

An evolved form of the banking Trojan was distributed by number one-ranking Emotet in a campaign that hit 5% of businesses globally
9 Sep 2020
BlackRock banking Trojan targets Android apps
Toy horse on a digital screen to symbolise the attack of the Trojan virus
trojans

BlackRock banking Trojan targets Android apps

Trojan steals login credentials and credit card information and has targeted more than 300 apps
27 Jul 2020
Researchers detail Tetrade family of Brazilian banking trojans
Toy horse on a digital screen to symbolise the attack of the Trojan virus
hacking

Researchers detail Tetrade family of Brazilian banking trojans

Researchers predict banking trojans will continue to evolve and take on new targets
16 Jul 2020
Four steps to exterminating RATs controlling your computer
trojans

Four steps to exterminating RATs controlling your computer

Unless actively pursued, damaging remote access trojans have the ability to live years undetected
29 Apr 2020
Decade of the RATs - remote access trojans
Whitepaperwhitepaper

Decade of the RATs - remote access trojans

Cross-platform APT espionage attacks targeting Linux, Windows and Android
27 Apr 2020
Decade of the RATs - remote access trojans
Whitepaperwhitepaper

Decade of the RATs - remote access trojans

Cross-platform APT espionage attacks targeting Linux, Windows and Android
27 Apr 2020
Threat groups relying on trojanized apps to spread surveillanceware
malware

Threat groups relying on trojanized apps to spread surveillanceware

Apurva Kumar shows how Monokle is spreading its surveillanceware
24 Apr 2020
National Crime Agency brings down prolific Trojan marketplace
Trojan
trojans

National Crime Agency brings down prolific Trojan marketplace

Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Malware spread through the Windows update mechanism
Trojan
trojans

Malware spread through the Windows update mechanism

By using the Windows update delivery system, the malicious traffic of this trojan can evade firewalls
10 Sep 2019
Trickbot now uses Excel to steal passwords and browser data
The Microsoft Excel app on a mobile phone with headphones plugged in
malware

Trickbot now uses Excel to steal passwords and browser data

The banking trojan has pivoted from stealing victims’ financial details to credentials and web history
12 Nov 2018
Infected Android apps back on Google Play after name change
malware

Infected Android apps back on Google Play after name change

Symantec discovers seven malicious apps sneaked back onto Google Play with different names
14 May 2018
Cryptocurrency miners: the latest tool for cyber criminals
digital currency

Cryptocurrency miners: the latest tool for cyber criminals

Learn more about the new form of cyber crime that is being driven by cryptocurrency fever
13 Feb 2018
76% of local governments suffered a cyber attack in 2017
cyber attacks

76% of local governments suffered a cyber attack in 2017

Many IT professionals are unsure how to combat the rise in attacks
8 Feb 2018
Free Trojan kit includes a backdoor that spies on hackers
Security

Free Trojan kit includes a backdoor that spies on hackers

The flaw allows a single author to wrestle control of infected systems away from hackers
1 Sep 2017
Cardinal RAT went unnoticed for two years
Security

Cardinal RAT went unnoticed for two years

Remote access Trojan used malicious Excel macros to infect systems
21 Apr 2017
Wi-Fi hijacker Trojan masquerades as Android apps
Hackers
Google Android

Wi-Fi hijacker Trojan masquerades as Android apps

Switcher Trojan can hack your router's DNS requests
4 Jan 2017
Dropper RealShell shows malware devs are getting smarter
Security

Dropper RealShell shows malware devs are getting smarter

The Android Trojan dropper can avoid existing defences to install malicious files on Android devices
16 Jun 2015
Energy companies targeted by Laziok Trojan
Hacker
Security

Energy companies targeted by Laziok Trojan

Malware enters infrastructure, then sends in more advanced viruses to carry out attacks
2 Apr 2015
Regin malware used in attacks since 2008, Symantec research
Malware
Security

Regin malware used in attacks since 2008, Symantec research

Newly-discovered complex malware could be state-sponsored, researchers claim
24 Nov 2014
UK clampdown on PC hijackers prompts four arrests
Arrest
Security

UK clampdown on PC hijackers prompts four arrests

NCA-led initiative to stop users of Remote Access Trojans results in multiple arrests
21 Nov 2014
Fake WHO email about Ebola spreads malware
Click here for malware
Security

Fake WHO email about Ebola spreads malware

Advice email from “World Health Organization” harbours its own virus
24 Oct 2014