Trojan - Page 28

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL

Tiggre Miner Virus – How to Remove It

This article has been created in order to help explain what is the Tiggre miner virus and how you can remove Tiggre miner from your PC effectively. A new miner malware going by the nickname of Tiggre. The virus belongs…

THREAT REMOVAL

W32/Agent Virus – How to Remove It

This article has been created to help explain what is the W32/Agent virus and how to remove these types of threats from your computer effectively. If you came to this page, you are probably wondering what I that W32/Agent infection…

THREAT REMOVAL

Remove Zusy Trojan (Removal Instructions)

This article has been created to help explain what is the Zusy Trojan and how to remove it from your computer effectively. A new Trojan horse has been detected to spread at an alarming rate that surpasses even the WannaCry…

THREAT REMOVAL

“Your connection is not private” Error – How to Fix

“Your connection is not private” This post has been created to help you fix the “Your connection is not private” error which may appear in your Google Chrome web browser. Many users have begun complaining and seeking solution to a…

THREAT REMOVAL
How-to-Remove-Facebook-Friend-Request-Virus-sensorstechforum

How to Remove Facebook Friend Request Virus

What Is Facebook Friend Request Virus? In this article, we aim to inform you about the recently detected Facebook Friend Request Virus and provide you help with the removal process in case you experience symptoms of this virus on your…

THREAT REMOVAL

Remove Ursnif Trojan (Purolator Phishing) Scam

This article will aid you to remove the Ursnif Trojan (Purolator phishing scam) completely. Follow the Trojan horse removal instructions given at the end of the article. Ursnif Trojan is a banking Trojan horse that is recently being spread via…

THREAT REMOVAL

Critical Firefox Update (firefox-patch.js) Virus Scam – How to Remove It

This article has been created to explain what is the Critical Firefox Update virus and how to stop such malicious redirects to dangerous pages in the future. A new redirect web page which tries to infect victim computers with malware…

THREAT REMOVAL

Trojan.Madominer Coin Miner Worm – How to Remove It from Windows

This article has been created in order to explain what is the Trojan.Madominer virus and how you can remove this miner worm completely. A new Trojan that is also a worm infection has been detected by security researchers at Symantec.…

THREAT REMOVAL
skype-flaw-use-with-caution-sensorstechforum

What Is Skype Virus and How to Remove It

What Is Skype Virus? What is Skype virus? Because of their popularity and large adoption by users worldwide, applications such as Skype and Facebook are targeted by malware authors quite often. This article is dedicated to Skype malware, often referred…

THREAT REMOVAL

Remove Appmaster Malware — Identify and Remove Active Infections

This article has been made with the main idea in mind to show you how you can remove the AppMaster Malware fake optimizer program from your PC. The Appmaster malware is a dangerous virus code that can be embedded in…

THREAT REMOVAL

Remove BondUpdater Trojan – Restore Your Computer From Infections

The BondUpdater Trojan is a dangerous weapon used against high-profile targets utilizing an unique infection mechanism. It is believed that the criminals behind it are highly experienced and are connected to a state-sponsored actor. Our article gives an overview of…

THREAT REMOVAL

CobInt Trojan Removal Instructions — Restore Your Computer From Infections

The CobInt Trojan is a newly devised malware that has been identified in several ongoing attacks. It is an upgraded version of a previous weapon that has the potential of infecting whole networks of computers. A dangerous characteristic of it…

THREAT REMOVAL

Remove Locdoor (DryCry) Ransomware – Restore Data

This article will help you remove Locdoor ransomware efficiently. Follow the ransomware removal instructions provided at the end of the article. Locdoor is a virus that claims to encrypt your files and demands money as a ransom to supposedly get…

THREAT REMOVAL

Dark Tequila Trojan Removal Instructions — Restore Your Computer From Infections

Dark Tequila Trojan is considered a dangerous virus, detailed information about its operations and removal instructions can be found in our article. It is being used against major services over the years in various attack campaigns. Its modular structures allows…

THREAT REMOVAL

Remove AcridRain Trojan Infections From Your PC

The AcridRain Trojan is a typical example of a computer virus that can cause considerable damage. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus. AcridRain Trojan –…

THREAT REMOVAL

Rocke Miner Removal — Identify and Delete Active Infections

Rocke Miner is a hacking weapon that can infect multiple hosts at once, our in-depth removal article shows how victims can remove active infections. Depending on its exact configuration it can perform various system changes and even deliver other infections.…

THREAT REMOVAL

Remove Cortana.exe CryptoMiner Malware Completely

This article will help you to remove Cortana.exe Miner totally. Follow the removal instructions for the miner malware provided at the end of the article. Cortana.exe Miner is the name of an executable process. The process is designed to be…

THREAT REMOVAL

Turla Trojan Removal Instructions — Restore Your Computer From Infections

The Turla Trojan attacks are currently infecting users worldwide in an offensive campaign. The captured samples showcase that the threat can cause widespread damage on the compromised hosts. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL

AdvisorsBot Trojan Removal — Identify and Delete Active Infections

AdvisorsBot Trojan is a newly discovered hacking weapon which is being distributed against targets worldwide. Its modular engine allows the criminal operators to carry out complex infections utilizing a variety of modules. Our article looks at the typical samples and…

THREAT REMOVAL
Lazarus Group image

New Mac Crypto Exchange Trojan Unleashed by The Lazarus Hacking Group

A well-known North Korean hacking entity, calling itself Lazarus Group has continued it’s activity after hacking Sony Films several years ago and they have now unleashed their newest creation – a Lazarus Trojan for Mac OS machines. Kaspersky researchers have…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree