Latest Trojan horse Stories

2011-08-04 05:25:00

Researchers from CA Technologies said that Android users may be at risk of hackers listening in to their phone calls due to a new piece of malware. The Trojan virus, according to CA, records phone conversations in "amr" format, which could be published online by cyber criminals. As the a conversation with an infected phone takes place, the Trojan stores the recorded call in a directory in the SDCard, which could then be uploaded to a server under the hackers control. "Once the malware is...

2011-01-31 07:30:00

ORLANDO, Fla., Jan. 31, 2011 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, announced the discovery of security exploits via popular social media sites Facebook and Twitter. In the last several days, two new malware strains have been wreaking havoc on Facebook users. The first, Asprox.N, is a Trojan delivered via email informing users their Facebook account is being used to distribute spam and that, for security reasons, the login credentials have been changed. The...

2011-01-12 11:00:00

BOULDER, Colo., Jan. 12, 2011 /PRNewswire/ -- Every month hundreds of thousands of unsuspecting computer users are faced by the inconveniences, complications and data loss that can come with Trojan horses, worms and email viruses. But before you can protect yourself--and your system--against them, you must first understand what they are. Computer Virus Information A virus is a computer program that distributes copies of itself, even without permission or knowledge of the user. The three...

2010-11-10 15:38:22

Computer security experts warned that a fake email invitation to this year's Nobel Peace Prize ceremony is circulating and carrying a virus capable of infecting the computer of anyone who opens it. The Contagio Internet security blog reported that the email includes a PDF attachment containing a so-called "Trojan horse," that allows hackers to take control of victims' computers. "Dear Sir/Madame. I enclose a letter from Oslo Freedom Forum founder Thor Halvorssen inviting you to join him in...

2010-10-26 09:35:00

FAIRFAX, Va., Oct. 26 /PRNewswire/ -- Norman ASA, a leading security company offering products protecting government and enterprise networks and consumer desktops, today announced that its researchers have identified new Trojan malware that infected the Nobel Peace Prize site early Tuesday. The new Trojan was transmitted through a vulnerability in Firefox version 3.5 and 3.6. The Norman Malware Detection Team in Oslo found that the attack was enabled by a zero-day vulnerability in the...

2010-04-28 06:35:00

Email messages notifying Apple iPad users of a new iTunes software update are fake, and can actually open up a remote access point for cyber criminals when downloaded, according to a warning from Romanian-based security firm BitDefender. However, the Windows PCs of iPad users are the devices being targeted, not the iPads themselves, according to Claudine Beaumont, Technology Editor for the UK paper The Telegraph. The emails are received via PC, and according to what BitDefender told the AFP...

2010-03-09 06:10:00

Energizer and US-CERT have warned that software downloaded for use with the Energizer DUO USB battery charger contains a backdoor that could allow an attacker to remotely take control of a Windows-based PC. "The installer for the Energizer Duo software places the file UsbCharger.dll in the application's directory and Arucer.dll in the Windows system32 directory," the U.S. Computer Emergency Readiness Team said in an advisory on Friday. "Arucer.dll is a backdoor that allows unauthorized...

2010-02-18 07:00:00

HERNDON , Va., Feb. 18 /PRNewswire/ -- NetWitness, the world leader in advanced persistent threat detection and real-time network forensics, announced today that its analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the "Kneber botnet" after the username linking the infected systems worldwide, gathers login credentials to online financial systems, social networking sites and email...

2010-01-28 09:10:00

WALTHAM, Mass., Jan. 28 /PRNewswire/ -- Application Whitelisting industry leader Bit9 announced today that Application Whitelisting is being used to prevent the current Internet Explorer (IE) zero-day attacks. (Logo: http://www.newscom.com/cgi-bin/prnh/20080204/BIT9LOGO ) The recent attacks (also called the Hydraq Trojan or Operation Aurora) are sophisticated and organized cyber attacks that seek to access and steal information from compromised computers. Bit9 Application Whitelisting...

2010-01-21 02:11:00

BEIJING, Jan. 21 /PRNewswire-Asia/ -- Maxthon announced its browser already has in place technology that blocks zero-day "Aurora" hacking attacks such as the one that broke into computers run by 20 companies, including Google, Adobe, and Juniper Networks, making away with intellectual property. The attack exploited a previously unknown vulnerability, nicknamed Aurora, in Internet Explorer. The attacks took advantage of buffers in a file, mshtml.dll, engineers at Maxthon explained....

Word of the Day
  • Like a worm in form or movement; vermiform; tortuous or sinuous; also, writhing or wriggling.
  • Like the track or trace of a worm; appearing as if worm-eaten; vermiculate.
  • Marked with fine, close-set, wavy or tortuous lines of color; vermiculated.
  • A form of rusticated masonry which is so wrought as to appear thickly indented with worm-tracks.
This word ultimately comes from the Latin 'vermis,' worm.