Trojan - Page 30

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
How-to-Remove-Facebook-Friend-Request-Virus-sensorstechforum

How to Remove Facebook Friend Request Virus

What Is Facebook Friend Request Virus? In this article, we aim to inform you about the recently detected Facebook Friend Request Virus and provide you help with the removal process in case you experience symptoms of this virus on your…

THREAT REMOVAL

Remove Ursnif Trojan (Purolator Phishing) Scam

This article will aid you to remove the Ursnif Trojan (Purolator phishing scam) completely. Follow the Trojan horse removal instructions given at the end of the article. Ursnif Trojan is a banking Trojan horse that is recently being spread via…

THREAT REMOVAL

Critical Firefox Update (firefox-patch.js) Virus Scam – How to Remove It

This article has been created to explain what is the Critical Firefox Update virus and how to stop such malicious redirects to dangerous pages in the future. A new redirect web page which tries to infect victim computers with malware…

THREAT REMOVAL

Trojan.Madominer Coin Miner Worm – How to Remove It from Windows

This article has been created in order to explain what is the Trojan.Madominer virus and how you can remove this miner worm completely. A new Trojan that is also a worm infection has been detected by security researchers at Symantec.…

THREAT REMOVAL
skype-flaw-use-with-caution-sensorstechforum

What Is Skype Virus and How to Remove It

What Is Skype Virus? What is Skype virus? Because of their popularity and large adoption by users worldwide, applications such as Skype and Facebook are targeted by malware authors quite often. This article is dedicated to Skype malware, often referred…

THREAT REMOVAL

Remove Appmaster Malware — Identify and Remove Active Infections

This article has been made with the main idea in mind to show you how you can remove the AppMaster Malware fake optimizer program from your PC. The Appmaster malware is a dangerous virus code that can be embedded in…

THREAT REMOVAL

Remove BondUpdater Trojan – Restore Your Computer From Infections

The BondUpdater Trojan is a dangerous weapon used against high-profile targets utilizing an unique infection mechanism. It is believed that the criminals behind it are highly experienced and are connected to a state-sponsored actor. Our article gives an overview of…

THREAT REMOVAL

CobInt Trojan Removal Instructions — Restore Your Computer From Infections

The CobInt Trojan is a newly devised malware that has been identified in several ongoing attacks. It is an upgraded version of a previous weapon that has the potential of infecting whole networks of computers. A dangerous characteristic of it…

THREAT REMOVAL

Remove Locdoor (DryCry) Ransomware – Restore Data

This article will help you remove Locdoor ransomware efficiently. Follow the ransomware removal instructions provided at the end of the article. Locdoor is a virus that claims to encrypt your files and demands money as a ransom to supposedly get…

THREAT REMOVAL

Dark Tequila Trojan Removal Instructions — Restore Your Computer From Infections

Dark Tequila Trojan is considered a dangerous virus, detailed information about its operations and removal instructions can be found in our article. It is being used against major services over the years in various attack campaigns. Its modular structures allows…

THREAT REMOVAL

Remove AcridRain Trojan Infections From Your PC

The AcridRain Trojan is a typical example of a computer virus that can cause considerable damage. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus. AcridRain Trojan –…

THREAT REMOVAL

Rocke Miner Removal — Identify and Delete Active Infections

Rocke Miner is a hacking weapon that can infect multiple hosts at once, our in-depth removal article shows how victims can remove active infections. Depending on its exact configuration it can perform various system changes and even deliver other infections.…

THREAT REMOVAL

Remove Cortana.exe CryptoMiner Malware Completely

This article will help you to remove Cortana.exe Miner totally. Follow the removal instructions for the miner malware provided at the end of the article. Cortana.exe Miner is the name of an executable process. The process is designed to be…

THREAT REMOVAL

Turla Trojan Removal Instructions — Restore Your Computer From Infections

The Turla Trojan attacks are currently infecting users worldwide in an offensive campaign. The captured samples showcase that the threat can cause widespread damage on the compromised hosts. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL

AdvisorsBot Trojan Removal — Identify and Delete Active Infections

AdvisorsBot Trojan is a newly discovered hacking weapon which is being distributed against targets worldwide. Its modular engine allows the criminal operators to carry out complex infections utilizing a variety of modules. Our article looks at the typical samples and…

THREAT REMOVAL
Lazarus Group image

New Mac Crypto Exchange Trojan Unleashed by The Lazarus Hacking Group

A well-known North Korean hacking entity, calling itself Lazarus Group has continued it’s activity after hacking Sony Films several years ago and they have now unleashed their newest creation – a Lazarus Trojan for Mac OS machines. Kaspersky researchers have…

THREAT REMOVAL

Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration…

THREAT REMOVAL

Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus

The AdKoob malware is a hybrid Trojan and hijacker virus which has recently been discovered in a global attack campaign. It is distributed using various methods and features many modules that are executed following the infection. Our article gives a…

THREAT REMOVAL
Koadic Trojan image

Koadic Trojan Removal — Restore Your PC From Infections

The Koadic Trojan is a dangerous Python-based RAT that can cause serious damage to infected hosts. It consists of a modular engine and plugins that add to its functionality. Read our in-depth article to learn more about it. Koadic Trojan…

THREAT REMOVAL

Trojan.Redgamble – How to Remove It from Your Computer

This article has been created to explain what is the Redgamble Trojan and how you can remove it from your computer successfully. A new Infostealer Trojan has been detected in the wild, obtaining different information from compromised comptuers. The malware…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree