Tag "Trojan"

Back to homepage
Mobile

Android Trojan Spreads via DNS Hijacking

An Android Trojan masquerading as popular mobile applications is propagating via smartphones roaming between Wi-Fi networks, Kaspersky Lab warns. Over the span of two months, the Moscow-based security firm observed

Software

Common IT Tools are the Hacker’s Favorites

Malware, along with targeted attacks that can move laterally and evade traditional detection methods, are a huge and growing concern. Popular hacker tools like Mimikatz are being combined with stolen NSA

Software

Prevention Is Better Than Cure – Are You Cyber Secure?

A cyber attack can be as simple as an email that looks like it comes from your bank and includes an urgent link for you to click. When you take

Mobile

Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

Recent research from IBM X-Force highlighted banking Trojan operators’ increasing interest in stealing cryptocurrency and analyzed a webinjection scheme the TrickBot Trojan used to deliver stolen coins to attackers’ wallets.

Software

Cryptojacking is the new malware

The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which thse currencies are earned. At its core, mining for cryptocurrency requires massive

Software

Cryptomining malware continues to drain enterprise CPU power

Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global Threat Impact Index.Researchers discovered three different

Software

What can businesses learn from the cyber threat landscape of 2017?

Over the course of 2017, global cyber threats continued to evolve at pace, resulting in a dramatic reshaping of the cyber security landscape. Traditional threats such as generic Trojans, ransomware

Software

ICO protection: Key threats, attack tools and safeguards

Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering).On average, over 100 attacks are conducted

Mobile

North Korean Defectors Targeted in Mobile Espionage Campaign

Malicious APK files are being used to attack North Korean defectors and journalists with the KakaoTalk chat app, a popular mobile communication method in South Korea.According to the McAfee Mobile

Software

Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point.Researchers