Amold's USB Stick Guard Provides 100% Protection To your PC, USB Drives and Data. USB Stick Guard is the Best Choice if you want Protection...
Showing results 1 to 20 of 23
The Cridex data-stealing Trojan is using spammer techniques to break captcha challenges to open webmail accounts and propagate itself, according to security company Websense
Reports say government staff fall prey to cyber espionage in the form of a Christmas e-greeting scam, where a Trojan variant stole passwords and documents and sent the data to a Belarus server.
A data-stealing Trojan affecting Android devices has emerged in China.The Geinimi Trojan sends location co-ordinates, unique device identifiers, and a list of installed apps on the infected device to a remote server.
A gang suspected of using the Zeus data-stealing Trojan to gain access to bank accounts and steal millions of pounds has been arrested by the Metropolitan Police
The game app allows another person to track the location of an Android phone remotely, but requires local access to the 'victim' device in order to successfully install it
1-ACT Personal Firewall 2006 is an enhanced personal firewall that keeps all types of viruses, worms, Trojans, and hackers out and...
Customers lost up to US$4,700 each to criminals who used a variant of the Zeus data-stealing Trojan to infect Windows systems, Macs and even Wii consoles, according to security company M86.
Customers lost up to £3,000 each to criminals who used a variant of the Zeus data-stealing Trojan to infect Windows systems, Macs and even Wii consoles, according to M86
Botnets are being deployed by criminals to put the Zeus Trojan on systems used by the customers of all of the major UK banks, according to security company Trusteer
Symantec is warning about a new Trojan horse that encrypts files on compromised computers but offers no ransom note like other software designed to hold data hostage for a fee.
Users of the popular social network are being tricked into revealing their passwords and downloading a Trojan that steals financial data. Here's how...
Earlier this week, Swiss programmer Ruben Unteregger who has been reportedly working for a Swiss company ERA IT Solutions responsible for coding government sponsored spyware, has released the source code of a trojan horse that injects code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker.Here's how the trojan, currently detected as Trojan.
Researchers at SecureWorks have stumbled upon what appears to be a massive identity theft ring using state-of-the-art Trojan code to steal confidential data from thousands of infected machines in the U.S.
The world of CI (competitive intelligence) spans the spectrum from analytical data gathering to seamy shoulder surfing and of course the use of custom Trojan horses. This article in Forbes describes how you can get insight into a company's future product plans by researching their job postings.
Software hides itself on phones to secretly capture data, leading one security company to label it a Trojan horse.
A Trojan that tries to hold users to ransom could be part of a growing trend
The couple responsible for producing and distributing the Trojan horse code that was used by three Israeli Private Investigation Firms to gather data against companies in Israel have been indicted but the prosecuter also said that they have reached a plea bargain accord.
Businesses need to be alert to the growing threat posed by those who use Trojan horses and spyware to try and steal valuable data, according to MessageLabs
Phishers and spammers are 'jumping on the bandwagon' following the MasterCard security breach by trying to fool users into disclosing personal information or executing viruses and Trojan horses on their PCs.The phishers and malware writers have started sending e-mails that refer to the high profile data security breach at MasterCard -- when information on more than 40 million credit cards was stolen - with an offer to help worried card holders into "recovering" their stolen information.
For some phones infected by the Trojan, the only real fix is a hard reset, which wipes all user data from the device.
Worm? Trojan? Attack tool? Network administrators and security experts search for the cause of an increasing amount of odd data that has been detected on the Internet.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)