The Latest in IT Security

Posts Tagged ‘trojan’

Palo Alto Networks researchers spotted a new, more complex backdoor trojan that is targeting Skype users, and which can identify and evade the security software found on the victim’s computer. Palo Alto’s Josh Grunzweig and Jen Miller-Osborn, part of the company’s Unit 42 research team, dubbed the backdoor T9000 as it is a newer variant […]

Read more ...

The Spy Banker Trojan is spreading through Brazil through the help of Google and Facebook, according to researchers at ZScaler ThreatLabZ. Attackers host the Spy Banker downloader on Google Cloud servers. The downloader, in turn, installs the payload Spy Banker Trojan Telax. Victims are infected by drive-by download or led to it via links (shortened […]

Read more ...

Security researchers from Cheetah Mobile (CM) recently discovered over 30 brands that come pre-installed with the Cloudsota Trojan. These rooted tablets are being sold on Amazon, as well as other reputable online stores. The CM security Lab has detected that Cloudsota can install adware/malware on the devices while performing a silent uninstall of antivirus applications. […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments