The Latest in IT Security

Posts Tagged ‘Trojans’

Attackers are creating rogue versions of popular Android applications that compromise the security of devices and are extremely hard to remove. Researchers from mobile security firm Lookout have found more than 20,000 samples of such trojanized apps. They’re typically fully functional copies of top Android applications like Candy Crush, Facebook, Google Now, NYTimes, Okta, SnapChat, […]

Read more ...

#g data researchers discovered a 64.8 percent #spike of new #malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the total number of malware strains this year is expected to be well above the level of 2014, with the U.S., China and France […]

Read more ...

Authorities from six European countries have taken down a major cybercriminal group in Ukraine suspected of developing, exploiting and distributing well-known banking Trojans Zeus and SpyEye, according to Europol. Police arrested five suspects between June 18 and 19. The cybercriminals used malware to attack online banking systems in Europe and elsewhere, adapting their sophisticated banking […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments