Another wrinkle in the spy-vs-spy Mac security game appeared Wednesday when a Mac Trojan Horse attempted to disguise itself by naming a file “intego,” a reference to company. Intego said the ...
Many home PC users may have been infected after a large-scale sustained Trojan horse attack that took place over the weekend, security vendors believe. The Trojan, named "Storm Worm" by antivirus ...
DALLAS--(BUSINESS WIRE)--Zimperium, the only mobile security platform purpose-built for enterprise environments, today published new research detailing the increasing risk financial institutions and ...
A new kind of malware circulating on the Internet freezes a computer and then asks for a ransom paid through Western Union Holdings Inc.’s money-transfer service. A sample of the Trojan horse virus ...
An Australian software developer is considering suing McAfee after the antivirus company wrongly identified his Internet setup program as a Trojan horse in a recent virus definition update. Mark ...
It is estimated that 560,000 new pieces of malware are detected on a daily basis, and over 1 billion malware programs currently exist. Malware refers to several different types of malicious software ...
A destructive "Trojan Horse" malware program has penetrated the software that runs much of the nation's critical infrastructure and is poised to cause an economic catastrophe, according to the ...