Another wrinkle in the spy-vs-spy Mac security game appeared Wednesday when a Mac Trojan Horse attempted to disguise itself by naming a file “intego,” a reference to company. Intego said the ...
Many home PC users may have been infected after a large-scale sustained Trojan horse attack that took place over the weekend, security vendors believe. The Trojan, named "Storm Worm" by antivirus ...
DALLAS--(BUSINESS WIRE)--Zimperium, the only mobile security platform purpose-built for enterprise environments, today published new research detailing the increasing risk financial institutions and ...
A new kind of malware circulating on the Internet freezes a computer and then asks for a ransom paid through Western Union Holdings Inc.’s money-transfer service. A sample of the Trojan horse virus ...
An Australian software developer is considering suing McAfee after the antivirus company wrongly identified his Internet setup program as a Trojan horse in a recent virus definition update. Mark ...
It is estimated that 560,000 new pieces of malware are detected on a daily basis, and over 1 billion malware programs currently exist. Malware refers to several different types of malicious software ...
A destructive "Trojan Horse" malware program has penetrated the software that runs much of the nation's critical infrastructure and is poised to cause an economic catastrophe, according to the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results