The Latest in IT Security

Posts Tagged ‘trojan’

Most Trojans are basically the same: Having penetrated a device, they steal the owner’s payment information, mine cryptocurrency for the attackers, or encrypt data and demand a ransom.

Read more ...

Hackers are testing a new variation of the Ursnif Trojan aimed at Australian bank customers that utilizes novel code injection techniques. Since the summer of 2017, IBM X-Force researchers report that Ursnif (or Gozi) samples have been tested in the wild by a new malware developer. The samples are a noteworthy upgrade from previous versions. […]

Read more ...

Google has discovered and removed from Google Play a number of apps that contained the Tizi backdoor, which installs spyware to steal sensitive data from popular social media applications. Read More

Read more ...

Categories

MONDAY, FEBRUARY 19, 2018

Featured

Archives

Latest Comments

Social Networks