Latest Trojan horse Stories
The German government is spying on computer users in its country with a trojan horse program without their consent, a German hacker group claims.
Researchers from CA Technologies said that Android users may be at risk of hackers listening in to their phone calls due to a new piece of malware.
ORLANDO, Fla., Jan. 31, 2011 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, announced the discovery of security exploits via popular social media sites Facebook and Twitter. In the last several days, two new malware strains have been wreaking havoc on Facebook users.
BOULDER, Colo., Jan. 12, 2011 /PRNewswire/ -- Every month hundreds of thousands of unsuspecting computer users are faced by the inconveniences, complications and data loss that can come with Trojan horses, worms and email viruses.
Computer security experts warned that a fake email invitation to this year's Nobel Peace Prize ceremony is circulating and carrying a virus capable of infecting the computer of anyone who opens it.
FAIRFAX, Va., Oct. 26 /PRNewswire/ -- Norman ASA, a leading security company offering products protecting government and enterprise networks and consumer desktops, today announced that its researchers have identified new Trojan malware that infected the Nobel Peace Prize site early Tuesday.
Email messages notifying Apple iPad users of a new iTunes software update are fake, and can actually open up a remote access point for cyber criminals when downloaded.
Energizer and US-CERT have warned that software downloaded for use with the Energizer DUO USB battery charger contains a backdoor that could allow an attacker to remotely take control of a Windows-based PC.
- A handkerchief.
- Specifically— The legendary sweat-cloth; the handkerchief of St. Veronica, according to tradition miraculously impressed with the mask of Christ; also, the napkin about Christ's head (Johu xx. 7).
- In general, any miraculous portrait of Christ.