Showing results 1 to 20 of 25

January 2, 2013 By Sofaro Software Solution

USB Stick Guard

Amold's USB Stick Guard Provides 100% Protection To your PC, USB Drives and Data. USB Stick Guard is the Best Choice if you want Protection...

December 31, 2010 by

Geinimi Trojan targets Android devices

A data-stealing Trojan affecting Android devices has emerged in China.The Geinimi Trojan sends location co-ordinates, unique device identifiers, and a list of installed apps on the infected device to a remote server.

December 25, 2005 By Only PCTools

1-ACT Personal Firewall 2006

1-ACT Personal Firewall 2006 is an enhanced personal firewall that keeps all types of viruses, worms, Trojans, and hackers out and...

August 27, 2009 by

Source code for Skype eavesdropping trojan in the wild

Earlier this week, Swiss programmer Ruben Unteregger who has been reportedly working for a Swiss company ERA IT Solutions responsible for coding government sponsored spyware, has released the source code of a trojan horse that injects code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker.Here's how the trojan, currently detected as Trojan.

March 20, 2007 by

Competitive intelligence gathering

The world of CI (competitive intelligence) spans the spectrum from analytical data gathering to seamy shoulder surfing and of course the use of custom Trojan horses.  This article in Forbes describes how you can get insight into a company's future product plans by researching their job postings.

March 6, 2006 by

Haephratis Get Plea Bargain

The couple responsible for producing and distributing the Trojan horse code that was used by three Israeli Private Investigation Firms to gather data against companies in Israel have been indicted but the prosecuter also said that they have reached a plea bargain accord.

June 21, 2005 by

MasterCard phishers launch malware attack

Phishers and spammers are 'jumping on the bandwagon' following the MasterCard security breach by trying to fool users into disclosing personal information or executing viruses and Trojan horses on their PCs.The phishers and malware writers have started sending e-mails that refer to the high profile data security breach at MasterCard -- when information on more than 40 million credit cards was stolen - with an offer to help worried card holders into "recovering" their stolen information.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular