Malware+trojans

Showing results 1 to 20 of 33

antivirus auto remove virus

Viruses are a big nuisance, This is the best app antivirus download free for free Content Applications. but a quick scan with an anti-virus...

December 15, 2014 by Tkdevmobile

Bing ad serves malware to would-be Google Chrome switchers

The criminal gangs that specialize in malware love search engines, because they represent an ideal vector for getting Windows users to click on links that lead to potentially dangerous Trojans. The latest attack targets ads, and the social engineering is frighteningly good.

August 8, 2011

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

April 20, 2011

SuperAntiSpyware Free Edition

SuperAntiSpyware will remove all the spyware, not just the easy ones. Quick, complete and custom scanning of hard drives, removable...

December 15, 2014 by SUPERAntiSpyware

SafeDNS Agent

SafeDNS protects you from inappropriate websites. We offer proactive cloud protection for our users including blocking malware and...

December 14, 2014 by SafeDNS

Trojan may have contributed to fatal Spanair crash

The Spanair plane crash that killed 154 people two years ago on Friday may have been partly caused by malware, according to reports.The newspaper El Pais reported on Friday that Spanair's mainframe was contaminated with Trojans at the time that Flight JK 5022 to Gran Canaria crashed just after take-off at Madrid's Barajas airport.

August 20, 2010 by

Get Ride of Security Essential 2010

Security Essential 2010 is a rogue anti-spyware program from the family of Internet Security 2010. This malware is installed in PC by Trojans which pretend to be Flash update claiming to be an essential software to view video online.

April 8, 2010

From Gimmiv to Conficker: The lucrative MS08-067 flaw

GENEVA -- The critical MS08-067 vulnerability used by the Conficker worm to build a powerful botnet continues to be a lucrative security hole for cyber criminals.During a presentation at the Virus Bulletin 2009 conference here, a trio of Microsoft researchers dissected the malware attacks linked to MS08-067 and found that criminal gangs are still exploiting the flaw to plant data-theft Trojans on vulnerable Windows machines.

September 22, 2009 by

Malware industry going open source

Malware writers are turning to the open source model in an attempt to squeeze more life out of old Trojans, according to the security firm Symantec.Many virus writers are now giving away malicious code, and around 10 percent of the Trojan market has gone open source.

September 18, 2009 by

As attacks escalate, MS readies emergency IE patch

Microsoft is planning to ship an emergency Internet Explorer update tomorrow (December 17) to counter an escalating wave of malware attacks targeting a zero-day browser vulnerability.[ SEE: Hackers exploiting (unpatched) IE 7 flaw to launch drive-by attacks ]The out-of-band update, which will be rated critical, follows the public discovery of password-stealing Trojans exploiting the bug on Chinese-language Web sites.

December 16, 2008 by

Malware rates up 278% in the first half of 2008

Malware has risen by 278% in the first half of 2008, thanks to the large number of websites comprised last month, according to ScanSafe. Trojans are the most commonly blocked malware, they increased from 4% of malware in January 2008 to 27% in June 2008.

July 19, 2008

Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan's Malicious Code Research Center has uncovered a half of gigabyte of stolen data from US Healthcare organizations and from a major airline on crimeware servers in Argentina and Malaysia.A representative of Finjan stated:"Hackers incorporated sophisticated attacks using crimeware toolkits, Trojans, and Command and Control servers to drive traffic from a specific region with specific characteristics.

June 17, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories