The Latest in IT Security

Posts Tagged ‘Trojans’

Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all. Obtaining superuser access rights, popularly known as rooting, lets owners take full control of their devices.

Read more ...

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs. Little Flocker can be used to enforce strict access controls to a Mac’s files and directories as well as its webcam, microphone and other resources.

Read more ...

Cyber-criminals are adding file-encrypting features to traditional mobile banking Trojans, creating hybrid threats that can steal sensitive information and lock user files at the same time. One such Trojan is called Faketoken and its primary functionality is to generate fake login screens for more than 2,000 financial applications in order to steal login credentials. The […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments