A Trojan can rip off information from Android devices after it gains root access on them, researchers said. Rootnik uses Read More.
A new Trojan uses security software installed on the user’s computer to side-load dynamic link libraries (DLLs) needed to download Read More.
A Trojan called Janicab uses an undocumented function in LNK shortcut file type to infect Windows and Mac systems so Read More.
Reconnaissance operations are ongoing against companies related to the energy sector across the world, researchers said. A Trojan, dubbed Laziok Read More.
A new Trojan seeking credit cards is targeting Android users, researchers said. Right now, the malware is targeting Russian users, Read More.
While there are quite a few ways for bad guys to steal your money, click fraud still represents an efficient Read More.
In this year’s first quarter, one Trojan was responsible for 25 percent of attempted infections on Android devices. Trojan-SMS.AndroidOS.Stealer.a accounted Read More.
A downloader known as Upatre is going out with the aid of spam emails that come from “major financial institutions” Read More.
The popularity of Android means there are bad guys creating malware designed to take advantage of every little crevice in Read More.
There is now a Trojan that hacks WiFi routers in order to spread the Sality malware family. Sality is one Read More.