A Trojan is now capable of fingerprinting MAC addresses to see if it is running in a virtualized environment, researchers Read More.
A Trojan coded in Lua is targeting Linux platforms with the goal of adding them to a global botnet, researchers Read More.
There are currently 155 Android apps on the official Google Play Store infected with the Android.Spy Trojan. This is a Read More.
A Trojan can rip off information from Android devices after it gains root access on them, researchers said. Rootnik uses Read More.
A new Trojan uses security software installed on the user’s computer to side-load dynamic link libraries (DLLs) needed to download Read More.
A Trojan called Janicab uses an undocumented function in LNK shortcut file type to infect Windows and Mac systems so Read More.
Reconnaissance operations are ongoing against companies related to the energy sector across the world, researchers said. A Trojan, dubbed Laziok Read More.
A new Trojan seeking credit cards is targeting Android users, researchers said. Right now, the malware is targeting Russian users, Read More.
While there are quite a few ways for bad guys to steal your money, click fraud still represents an efficient Read More.
In this year’s first quarter, one Trojan was responsible for 25 percent of attempted infections on Android devices. Trojan-SMS.AndroidOS.Stealer.a accounted Read More.