Showing results 1 to 20 of 25

USB Stick Guard

Amold's USB Stick Guard Provides 100% Protection To your PC, USB Drives and Data. USB Stick Guard is the Best Choice if you want Protection...

January 2, 2013 By Sofaro Software Solution

Geinimi Trojan targets Android devices

A data-stealing Trojan affecting Android devices has emerged in China.The Geinimi Trojan sends location co-ordinates, unique device identifiers, and a list of installed apps on the infected device to a remote server.

December 31, 2010 by

1-ACT Personal Firewall 2006

1-ACT Personal Firewall 2006 is an enhanced personal firewall that keeps all types of viruses, worms, Trojans, and hackers out and...

December 25, 2005 By Only PCTools

Source code for Skype eavesdropping trojan in the wild

Earlier this week, Swiss programmer Ruben Unteregger who has been reportedly working for a Swiss company ERA IT Solutions responsible for coding government sponsored spyware, has released the source code of a trojan horse that injects code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker.Here's how the trojan, currently detected as Trojan.

August 27, 2009 by

Competitive intelligence gathering

The world of CI (competitive intelligence) spans the spectrum from analytical data gathering to seamy shoulder surfing and of course the use of custom Trojan horses.  This article in Forbes describes how you can get insight into a company's future product plans by researching their job postings.

March 20, 2007 by

Haephratis Get Plea Bargain

The couple responsible for producing and distributing the Trojan horse code that was used by three Israeli Private Investigation Firms to gather data against companies in Israel have been indicted but the prosecuter also said that they have reached a plea bargain accord.

March 6, 2006 by

MasterCard phishers launch malware attack

Phishers and spammers are 'jumping on the bandwagon' following the MasterCard security breach by trying to fool users into disclosing personal information or executing viruses and Trojan horses on their PCs.The phishers and malware writers have started sending e-mails that refer to the high profile data security breach at MasterCard -- when information on more than 40 million credit cards was stolen - with an offer to help worried card holders into "recovering" their stolen information.

June 21, 2005 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories