True strategy unfolds as you meet hundreds of REAL HEROES with unique skills. Join arms with your friends to fight in spectacular guild...
Showing results 1 to 20 of 833
A version of the client has been tampered to steal user data.
The Trojan is used in global phishing campaigns and targets both consumers and the enterprise.
Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.
Kaspersky has unearthed an Android-targeted Trojan, dubbed Podec, that can trick the CAPTCHA image verification system into thinking it is human.
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.
AVG continues to deliver essential free antivirus protection with the launch of AVG AntiVirus FREE 2015. It goes beyond simply detecting...
Thanks to the seasonal holiday, I finally got around to reading Rogue Code, the third techno-thriller in the Jeff Aiken series. Like Zero Day and Trojan Horse, it delivers entertainment with serious messages about cybersecurity.
Apple has thwarted WireLurker, discovered earlier this week, which has been targeting iOS users both through PCs and Macs.
AVG continues to deliver essential free antivirus protection with the launch of AVG AntiVirus 2015. It goes beyond simply detecting...
An iOS Trojan called Xsser mRat is similar to an Android virus and appears to be a rare cross platform attack. Target: Hong Kong protesters.
A collection of notable security news items for the week ending September 19, 2014. Covers enterprise, controversies, reports and more.
The notorious Shylock, a dangerous financial Trojan, has been disrupted due to the efforts of police and security experts.
In only seven days, over half a million euros were stolen from a European bank's customers courtesy of a new banking Trojan campaign.
More than 100 people around the world have been charged following an internationally-coordinated crackdown on the Blackshades remote access trojan.
A new report finds that number of mobile malware modifications designed for phishing users' banking and bank card information jumped by a factor of 20 last year.
A new variation of the notorious banking trojan has been found lurking in the wild, bent on targeting software-as-a-service (SaaS) applications.
An app which claims to send and receive payments on Bitcoin Stealth Addresses, OSX/CoinThief.A instead monitors traffic and steals Bitcoins.
The OSX/Flashback botnet is "adrift" says Intego, but still alive. Mac version research shows how this is unsurprising and not a big concern.
Attendees at the Paris summit of the G20 finance ministers and central bank governors fell for an email promising nude photos of Carla Bruni, former supermodel and wife of French President Nicolas Sarkozy.
The scale of the Cryptolocker threat is disputable. It's the psychology that is truly frightening.
FireEye has followed up on their report of a zero-day attack on Internet Explorer with deeper analysis. It seems to come from the same gang that launched the recent Operation DeputyDog attack.
Be on the lookout for fake updates to Chrome and Adobe Flash using high-quality techniques.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks