Best Security Search

Trojans

Ramnit Trojan Campaign Targets Major UK Banks
Trojans

Ramnit Trojan Campaign Targets Major UK Banks

An updated version of the Ramnit Trojan targets six major banks in the United Kingdom. Updated infrastructure of the malicious program is aiding the creators into spreading the Trojan. Ramnit Reminds Specialists That It Has Damage Potential Recent attack campaigns with Ramnit have been identified by IBM X-Force researchers. They have observed that the Trojan…

Analysts Shed Light on the Korplux RAT Malware
Trojans

Analysts Shed Light on the Korplux RAT Malware

Security experts have made a detailed analysis on the Karplux RAT malware, also known as PlugX, which has been used against important institutions in a variety of countries. The most famous example of a Korplux attack is the intrusion against 400 thousand members of Vietnam Airlines. Korplux Fools Victims by Pretending to Be an Antivirus…

Twitoor Is an Android Backdoor Trojan Controlled via Twitter
Trojans

Twitoor Is an Android Backdoor Trojan Controlled via Twitter

Security researchers discovered Twitoor, the first Trojan that affects Android smartphones. It is controlled remotely via malicious Twitter accounts that transmit control messages to the victim devices. Twitoor Is a Threat to Android Users Security researchers from ESET reported the discovery of Twitoor, a potent Android Trojan that is controlled via malicious Twitter accounts. Distribution…

Trojans

Android.Slicer.1 Trojan Can Buy Google Play Apps

A new Android malware has emerged and now it can purchase apps from Google Play Store. The detections of new Trojans which target mobile devices have increased recently. Trojans are often used to spread malware on Android devices. The Trojan is called Android.Slicer.1 and is distributed via bundling to other malware programs. The Trojan is…

Trojans

New Trojan.Kasidet.1 targets POS terminals

The Point of Sales terminals are among the most tempting target for credit card data stealing. There are many reported cases of POS malware infections until now. Is seems that cyber criminals are insatiable to create new and modify the existing versions of POS Trojans. The latest security news report released by the researchers from…