trojans

  1. No Warranty

    [Tip:] filehippo.com - Update Checker - get all you programs up to date

    Here's a great little program help get your computer up to date, it doesn't check for driver updates but it checks all programs installed on your computer and provides you with updates to download. I highly recommend using this program. You can download here...
  2. No Warranty

    Fake Windows updater targets government contractors

    Two security companies today released a joint report describing an ongoing series of attacks against government contractors that have been occurring since at least early 2009. According to the vendors Seculert and Zscaler, attackers are sending firms phishing e-mails with fake invitations to...
  3. FTA Hacker

    German officials admit to deploying intercept software

    Officials in a number of German state governments have owned up to using the Quellen-TKÜ Trojan Horse software in criminal investigations to intercept encrypted telecommunications on PCs. At least one state said it has suspended use of the software, after the Chaos Computer Club discovered that...
  4. FTA Hacker

    SpyEye steals banking codes by sending them to wrong phone

    Researchers from browser security vendor Trusteer have identified a new variant of the SpyEye financial Trojan that tricks online banking users into changing the phone numbers associated with their accounts. More...
  5. FTA Hacker

    Mac OS X Lion: Losing its security pride

    Spate of vulnerabilities and Trojan attacks has some wondering about the state of Apple Mac security. More...
  6. FTA Hacker

    Gang of Zeus-driven bank thieves put out of business

    A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs. More...
  7. FTA Hacker

    Apple updates OS X to block Mac Trojan

    Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document. More...
  8. FTA Hacker

    Apple updates OS X to block Mac Trojan

    Apple has updated the bare-bones antivirus protection included with Mac OS X to detect a Trojan horse that poses as a PDF document. More...
  9. FTA Hacker

    New Mac malware poses as PDF doc

    Security firms today warned Mac users of a new Trojan horse that masquerades as a PDF document. More...
  10. FTA Hacker

    China Hit By 480,000 Trojan Horse Attacks in 2010

    China said it saw close to 480,000 Trojan horse attacks in 2010, with almost half originating from outside the country, according to a government security agency. More...
  11. FTA Hacker

    Android Trojan records phone calls

    While previous Android malware only logged call information, a new Trojan records actual phone calls. More...
  12. FTA Hacker

    SpyEye Trojan morphs to defeat online banking defenses

    Banks are facing more trouble from SpyEye, a piece of malicious software that steals money from people's online bank accounts, according to new research from security vendor Trusteer. More...
  13. FTA Hacker

    The Latest Security Tool for Your Arsenal: Whitelisting

    Phishing, spear phishing, trojan horse and other attacks are growing in number and sophistication, seemingly by the day. There can be little disputing that notion after RSA, Sony, Lockheed and Citicorp were embarrassed by breaches this year. More...
  14. E

    NCAA rejects USC's appeal of football sanctions

    The NCAA on Thursday rejected Southern California's appeal to reduce sanctions imposed on its storied football program, keeping in place some of the harshest penalties leveled against a school in a quarter-century. USC must serve the second year of its two-year postseason ban this fall, making...
  15. CASPER

    Hackers hunt prey on smartphones, Facebook

    SAN FRANCISCO (AFP) – Hackers are following prey onto smartphones and social networking hotspots, according to reports released Tuesday by a pair of computer security firms. Cyber criminals are also ramping up the sophistication and frequency of attacks on business and government networks, one...
  16. L

    Can a virus from my external harddrive spread into my new mac and cause trouble?

    Ok so i've got this malicious microsoft-ic virus that somehow got into my external harddrive. It's called 32Willy or Willy32 if I'm not wrong. If I put this hardware into my mac, will the virus cause trouble since macs are supposedly not able to get ruined because of PC viruses? Thank you all.
  17. CASPER

    Johnson's shooting, VCU's balance keys to wins

    DAYTON, Ohio – The individual best performance in the "First Four" came from a guard who insists he's in a shooting slump. Melvin Johnson III scored a career-high 29 points during Texas-San Antonio's 70-61 win over Alabama State. He outscored the Hornets 25-21 in the first half, hitting one...
  18. D

    My RAID 0 Main Drive failed a Short DST test, but is working ok, what is the test and what do I do?

    Things have been a little off on my machine lately, slow, and buggy, so I am running some tests, and my main drive, 2 160 gig Seagates in Raid 0 failed a short dst test, and now I'm worried, I'm running chkdsk now, what else should I know?
  19. Scammer

    Men sexually active in 70s, 80s, 90s

    File this in the "age isn't anything but a number" category: Older men enjoy a satisfying sex life well in to their golden years, finds a new study published in the Annals of Internal Medicine. Researchers surveyed about 2,800 men in Australia, ages 75 to 95, and found a third of them had at...
  20. B

    Rustock Botnet Pumps Most Spam Despite Shrinking

    -------------------------------------------------------------------------------- A new report from Symantec put the Rustock botnet at the top of the heap for spamming in spite of the fact the number of infected computers under its control was slashed nearly in half. Rustock retained the top...
Back
Top