Best Security Search

Trojans

The Mutahaba Trojan Impersonates Google Chrome
Trojans

The Mutahaba Trojan Impersonates Google Chrome

A newly discovered Trojan named Mutahaba impersonates Google Chrome under the name Outfire. All Internet users should be careful when browsing the Web as the attack campaigns with Mutahaba have already started. Mutahaba Has Started to Target Computer Users The Mutahaba Trojan is one of the latest threats that impersonate legitimate software to conceal themselves….

Ramnit Trojan Campaign Targets Major UK Banks
Trojans

Ramnit Trojan Campaign Targets Major UK Banks

An updated version of the Ramnit Trojan targets six major banks in the United Kingdom. Updated infrastructure of the malicious program is aiding the creators into spreading the Trojan. Ramnit Reminds Specialists That It Has Damage Potential Recent attack campaigns with Ramnit have been identified by IBM X-Force researchers. They have observed that the Trojan…

Analysts Shed Light on the Korplux RAT Malware
Trojans

Analysts Shed Light on the Korplux RAT Malware

Security experts have made a detailed analysis on the Karplux RAT malware, also known as PlugX, which has been used against important institutions in a variety of countries. The most famous example of a Korplux attack is the intrusion against 400 thousand members of Vietnam Airlines. Korplux Fools Victims by Pretending to Be an Antivirus…

Twitoor Is an Android Backdoor Trojan Controlled via Twitter
Trojans

Twitoor Is an Android Backdoor Trojan Controlled via Twitter

Security researchers discovered Twitoor, the first Trojan that affects Android smartphones. It is controlled remotely via malicious Twitter accounts that transmit control messages to the victim devices. Twitoor Is a Threat to Android Users Security researchers from ESET reported the discovery of Twitoor, a potent Android Trojan that is controlled via malicious Twitter accounts. Distribution…