Trojans+malware

Showing results 1 to 20 of 33

UnHackMe

The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based...

December 9, 2014 by Greatis Software

Bing ad serves malware to would-be Google Chrome switchers

The criminal gangs that specialize in malware love search engines, because they represent an ideal vector for getting Windows users to click on links that lead to potentially dangerous Trojans. The latest attack targets ads, and the social engineering is frighteningly good.

August 8, 2011

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

April 20, 2011

Dr.Web Security Space

Comprehensive anti-virus security solution for your Windows PC. Real time protection. Installation and operation in an infected system...

December 3, 2014 by Doctor Web

AVG Internet Security 2015

AVG continues to deliver advanced antivirus protection with the launch of AVG Internet Security 2015. It goes beyond simply detecting...

October 23, 2014 by AVG Technologies USA

Trojan may have contributed to fatal Spanair crash

The Spanair plane crash that killed 154 people two years ago on Friday may have been partly caused by malware, according to reports.The newspaper El Pais reported on Friday that Spanair's mainframe was contaminated with Trojans at the time that Flight JK 5022 to Gran Canaria crashed just after take-off at Madrid's Barajas airport.

August 20, 2010 by

Get Ride of Security Essential 2010

Security Essential 2010 is a rogue anti-spyware program from the family of Internet Security 2010. This malware is installed in PC by Trojans which pretend to be Flash update claiming to be an essential software to view video online.

April 8, 2010

From Gimmiv to Conficker: The lucrative MS08-067 flaw

GENEVA -- The critical MS08-067 vulnerability used by the Conficker worm to build a powerful botnet continues to be a lucrative security hole for cyber criminals.During a presentation at the Virus Bulletin 2009 conference here, a trio of Microsoft researchers dissected the malware attacks linked to MS08-067 and found that criminal gangs are still exploiting the flaw to plant data-theft Trojans on vulnerable Windows machines.

September 22, 2009 by

Malware industry going open source

Malware writers are turning to the open source model in an attempt to squeeze more life out of old Trojans, according to the security firm Symantec.Many virus writers are now giving away malicious code, and around 10 percent of the Trojan market has gone open source.

September 18, 2009 by

As attacks escalate, MS readies emergency IE patch

Microsoft is planning to ship an emergency Internet Explorer update tomorrow (December 17) to counter an escalating wave of malware attacks targeting a zero-day browser vulnerability.[ SEE: Hackers exploiting (unpatched) IE 7 flaw to launch drive-by attacks ]The out-of-band update, which will be rated critical, follows the public discovery of password-stealing Trojans exploiting the bug on Chinese-language Web sites.

December 16, 2008 by

Malware rates up 278% in the first half of 2008

Malware has risen by 278% in the first half of 2008, thanks to the large number of websites comprised last month, according to ScanSafe. Trojans are the most commonly blocked malware, they increased from 4% of malware in January 2008 to 27% in June 2008.

July 19, 2008

Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan's Malicious Code Research Center has uncovered a half of gigabyte of stolen data from US Healthcare organizations and from a major airline on crimeware servers in Argentina and Malaysia.A representative of Finjan stated:"Hackers incorporated sophisticated attacks using crimeware toolkits, Trojans, and Command and Control servers to drive traffic from a specific region with specific characteristics.

June 17, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories