Source: National Cyber Security – Produced By Gregory Evans A notorious cyberespionage group with suspected links to Russian intelligence has developed a complex piece of malware designed to infect computer systems running Apple OSX, according to cybersecurity researchers at Palo Alto Networks. The hackers, dubbed Sofacy Group by the The…
Hackers Breach FossHub to Deliver Trojan That Rewrites MBR
Source: National Cyber Security – Produced By Gregory Evans How many times have you looked past the security signs that warn you that installing particular software could be dangerous for your computer? How many of us run untested programs with administrator privileges? In all likelihood, you would have done it…
Gameover ZeuS Trojan Targets Users of Monster.com Employment Portal
Source: National Cyber Security – Produced By Gregory Evans Zeus Trojan is one of the most popular families of Banking Trojan, which was also used in a targeted malware campaign against a Salesforce.com customer at the end of the last month and researchers found that the new variant of Zeus…
Chinese police arrest smartphone Trojan hacker
Smartphones running the Android operating system. (Photo/Xinhua) China’s police have arrested a suspect who allegedly spread the XXshenqi, a Trojan horse that has infected smartphones in several regions of the country. A Trojan horse is a malware program that contains […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
After Takedown, GameOver Zeus Banking Trojan Returns Again
A month after the FBI and Europol took down the GameOver Zeus botnet by seizing servers and disrupting the botnet’s operation, security researchers have unearthed a new variant of malware based explicitly on the same Gameover ZeuS that compromised users’ computers and collectively formed a massive botnet. GAMEOVER ZEUS TROJANThe…
Arab hactivist use remote access Trojan to hack 24,000 machines worldwide.
Symantec threat lab researchers say Arab Hackers based in Middle East are targeting the computers world wide using remote access Trojan njRAT. There are 487 groups involved in certain hacking campaign. Symantec says, “Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have…
Trojan Horses, Malware and Other Cyber Attack Tools are Just a Click Away
Trojan Horses, Malware and Other Cyber Attack Tools are Just a Click Away The Washington Post News Service with Bloomberg News (c) 2012, The Washington Post. Ryan Linn’s hacks into corporate networks have become almost a matter of routine. On one recent morning, he woke up at his home near…
Bafruz trojan vs Microsoft : Malicious Software Removal Tool Updated
There’s a new family of malware that’s using a complex set of capabilities to disable antimalware and listen in on sessions between users and some social networks. Bafruz is essentially a backdoor trojan that also is creating a peer-to-peer network of infected computers. Microsoft has announced that its Microsoft Malicious…
Trend Micro Warns of Trojan Posing as Chrome Installer
The malware, identified as TSPY_BANKER.EUIQ, redirects users to spoofed banking Web sites. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security
Video: Angry Birds Space Trojan & Drive-by Android
On Monday, we released our Mobile Threat Report for Q1, and in that report we mention there’s a growing number of mobile trojans that “deliver on their promises”. What do we mean by … View full post on National Cyber Security