Trojan Horse Malware

Type: Keyphrase
Name: Trojan Horse Malware
First reported 3 hours ago - Updated 36 mins ago - 1 reports

TrojanHunter 5.6 Build 1006 (Trial)

TrojanHunter is a security solution that searches and removes Trojan infections from your computer, offering at the same time a dedicated feature to provide real-time protection.The application provides three different scanning modes, full, quick and ... [Published Softpedia - 3 hours ago]
First reported 2 hours ago - Updated 2 hours ago - 1 reports

India among top 10 sources of spam around the world

Germany saw a big surge in the number of antivirus detectionsNews |byCIOL BureauBANGALORE, INDIA: In June Kaspersky Lab registered an increase in fraudulent messages sent on behalf of booking services. These fake notifications imitate hotel booking confirmations ... [Published Cyber India Online - 2 hours ago]
First reported 19 hours ago - Updated 2 hours ago - 2 reports

W32/PornoAsset Free Trojan Removal Tool

will detect and remove W32/PornoAsset Trojan completely, from your system. Download cleanpornoasset.exe and save it in a temporary directory. Double click on cleanpornoasset.exe to execute it. Follow the user-friendly instructions to detect and remove ... [Published ZDNet - 2 hours ago]
First reported 13 hours ago - Updated 3 hours ago - 1 reports

Top 10 Facebook scams

It's no secret that the Internet can be a dangerous place. With just one stray click, you can get a virus and malware, you can be hacked, have your identity stolen, or even get scammed. It's not fun.-advertisement-That's why it's so important to be careful what ... [Published Kim Komando - 13 hours ago]
First reported 22 hours ago - Updated 7 hours ago - 2 reports

Mysterious Malware 'Crouching Yeti' Has Infected High-Profile Targets Worldwide

Energetic Bear , a malware campaign that was initially thought to have come from Russia and only target power grids, is much more widespread and potentially dangerous than cybersecurity experts first imagined.A new report by the Kaspersky Lab indicates ... [Published Motherboard Magazine - 14 hours ago]
First reported Jul 30 2014 - Updated 21 hours ago - 1 reports

Big Android "Fake ID" Security Threat Uncovered

Bluebox Labs, a part of Bluebox Security, has discovered a flaw in Android that allows malware to pose as legitimate apps. This problem applies to all Android devices lower than Android 4.4 KitKat that are not patched against Google bug 13678484. Google ... [Published Tom's Hardware - Jul 30 2014]
First reported 23 hours ago - Updated 23 hours ago - 1 reports

Encrypted Andriod Smart Phone Technology

- Jul. 31, 2014 - CEN-02 encrypted Anriod phone micro Sd card adopts independent hardware encrypted engine; fulfill AES-256 high level encrypt standard; acquire CC EAL5+ approval.· AES:Advanced Encryption Standard 256 high level encryption standard. It ... [Published Prlog - 23 hours ago]
First reported Jul 31 2014 - Updated Jul 31 2014 - 1 reports

Kaspersky ScatterDecryptor 1.0.0.0 (Freeware)

Kaspersky ScatterDecryptor is an intuitive and reliable piece of security software designed to offer you a simple method of reverting the effects of the Ransom.BAT.Scatter infection from your system.Portability advantagesSubsequent to downloading it, ... [Published Softpedia - Jul 31 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Daily Ruleset Update Summary 07/30/2014

[***] Summary: [***] 48 new Open signatures, 55 new Pro (48 + 7). Sitelutions DYNAMIC_DNS detection, EZpass phish, Various Android. Thanks: @MalwareMustDie, @jaimeblascob, Balasubramaniam Natarajan, ABUSE.CH Open: 2018807 – ET TROJAN ABUSE.CH SSL ... [Published Emerging Threats - Jul 30 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Fiesta exploit kit does the splits

A few days ago we began noticing a strange new pattern with the Fiesta exploit kit. We were getting a double payload where before only one was delivered. So we decided to check our archives and figure out exactly what happened during the last few days. ... [Published Malwarebytes Unpacked - Jul 30 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Anvi Smart Defender 3.4

Smart and powerful protection against malicious software, such as virus, Trojans, adware, spyware, bots and other threats.Anvi Smart Defender delivers smart and powerful protection against malicious software, such as virus, Trojans, adware, spyware, bots ... [Published Warp 2 Search - Jul 30 2014]
First reported Jul 30 2014 - Updated Jul 30 2014 - 1 reports

Daily Ruleset Update Summary 07/29/2014

[***] Summary: [***] 7 new Pro signatures, 18 new Pro (7+11). Upatre, Various AndroidOS, Password Stealer. Thanks: Kevin Ross. [+++] Added rules: [+++] Open: 2018800 – ET SCAN Chroot-apache0day Unknown Web Scanner User Agent (scan.rules) 2018801 ... [Published Emerging Threats - Jul 30 2014]

Quotes

"In June, high-profile political and sporting events were used by scammers to trick users. In the run-up to the FIFA World Cup, a huge event for football fans, phishers were trying to obtain banking information from users by asking them to participate in the competition to win tickets. ‘Nigerian'scammers again exploited the situation in Ukraine and asked for help to transfer non-existent millions" commented Tatyana Shcherbakova, Anti-Spam Analyst at Kaspersky Lab
Hemagglutinin is completely folded at the start of the process of interest to researchers who study viral infection, Ma said. "It may be the only case known to human beings where a protein starts at a fixed point and literally completely refolds" he said
..."This shows that, first of all, you still have an exposure with iOS in the corporate environment," Shaulov said. "But the fact that you have additional defenses in the enterprise, helps reduce the exposure."
"It is worth considering whether takedowns are a win for the team of cyber good guys or just a timeout allowing the criminals to regroup and come back stronger" the expert noted

More Content

All (1604) | News (904) | Reports (0) | Blogs (694) | Audio/Video (0) | Fact Sheets (1) | Press Releases (3)
sort by: Date | Relevance
India among top 10 sources of spam around the w... [Published Cyber India Online - 2 hours ago]
W32/PornoAsset Free Trojan Removal Tool [Published ZDNet - 2 hours ago]
Researchers uncover clues to flu's mechanisms [Published Medical Xpress - 3 hours ago]
TrojanHunter 5.6 Build 1006 (Trial) [Published Softpedia - 3 hours ago]
Android vs. iOS Security Comparisons Get Compli... [Published eWeek - 5 hours ago]
How to Use “Honeypots” to Overcome Cybersecurit... [Published Power Magazine - 9 hours ago]
Middle East cyber attacks on the rise [Published Saudi Gazette - 12 hours ago]
TrojanHunter 5.6 [Published MajorGeeks.com - 12 hours ago]
Top 10 Facebook scams [Published Kim Komando - 13 hours ago]
Mysterious Malware 'Crouching Yeti' Has Infecte... [Published Motherboard Magazine - 14 hours ago]
Security Firm Analyzes Success of Botnet Takedowns [Published Security Week - 14 hours ago]
Crouching Yeti APT Campaign Stretches Back Four... [Published Threatpost - 19 hours ago]
W32/CleanZegost Trojan Removal Tool 1.0 (Freeware) [Published Softpedia - 19 hours ago]
Kaspersky: Bots, Malware Using Amazon Elasticse... [Published Talkin' Cloud - 21 hours ago]
Energetic Bear: more like a Crouching Yeti [Published Kaspersky Lab - 22 hours ago]
Hackers’ Blitz – Industrial Espionage Hits Germ... [Published World Industrial Reporter - 23 hours ago]
Keep your mobile phone secure ! [Published Prlog - 23 hours ago]
Encrypted Andriod Smart Phone Technology [Published Prlog - 23 hours ago]
ZoneAlarm Free Antivirus + Firewall v13.3.052.000 [Published AfterDawn.com - Jul 31 2014]
ZoneAlarm Extreme Security [DISCOUNT: 55% OFF!]... [Published Softpedia - Jul 31 2014]
Kaspersky ScatterDecryptor 1.0.0.0 (Freeware) [Published Softpedia - Jul 31 2014]
Patent Issued for Method and Apparatus for Stor... [Published HispanicBusiness.com - Jul 31 2014]
ZoneAlarm Free Antivirus + Firewall 13.3.052.000 [Published MajorGeeks.com - Jul 30 2014]
Daily Ruleset Update Summary 07/30/2014 [Published Emerging Threats - Jul 30 2014]
Your Android has a Fake ID problem, allowing ma... [Published Computerworld - Jul 30 2014]
Fiesta exploit kit does the splits [Published Malwarebytes Unpacked - Jul 30 2014]
Pushdo Botnet Continues to Stay Strong [Published Softpedia - Jul 30 2014]
Counting the cost of cyber crime [Published FTSE Global Markets - Jul 30 2014]
Big Android "Fake ID" Security Threat Uncovered [Published Tom's Hardware - Jul 30 2014]
Avira Free Antivirus 14.0.6.552 [Published MajorGeeks.com - Jul 30 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Energetic Bear: more like a Crouching Yeti [Published Kaspersky Lab - 22 hours ago]
Report     Appendix     Energetic Bear/Crouching Yeti is an actor involved in several advanced persistent threat (APT) campaigns that has been active going back to at least the end of 2010. Targeted sectors include: Industrial/machineryManuf ...
Daily Ruleset Update Summary 07/30/2014 [Published Emerging Threats - Jul 30 2014]
[***] Summary: [***] 48 new Open signatures, 55 new Pro (48 + 7). Sitelutions DYNAMIC_DNS detection, EZpass phish, Various Android. Thanks: @MalwareMustDie, @jaimeblascob, Balasubramaniam Natarajan, ABUSE.CH Open: 2018807 – ET TROJAN ABUSE.CH SSL ...
Fiesta exploit kit does the splits [Published Malwarebytes Unpacked - Jul 30 2014]
A few days ago we began noticing a strange new pattern with the Fiesta exploit kit. We were getting a double payload where before only one was delivered. So we decided to check our archives and figure out exactly what happened during the last few days. ...
Android security flaw gives bad apps super-powers [Published We Live Security - Jul 30 2014]
A new Android flaw potentially affecting up to 80% of current handsets could leave users vulnerable to rogue apps – leapfrogging the defenses used to ensure malicious developers cannot sneak malware onto Android devices, according to the BBC’s report.  ...
Israel defence firm denies being hacked by Chin... [Published SiliconANGLE - Jul 30 2014]
A defence contractor that works on Israel’s Iron Dome missile shield system has come out to deny it was a victim of Chinese hack attack two years ago that allegedly stole classified information about the technology. Israel Aerospace Industries (IAI) ...
1 2 3 4 5 6 7 8 9 10 ...

Press Releases

sort by: Date | Relevance
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
Speech: Cyber security: City Week 2014 [Published Keeping the UK safe in cyber space - Activity o ... - Mar 31 2014]
Booz Allen Says Cyber Attacks Are the “New Norm... [Published Business Wire - Dec 04 2013]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.