Trojan - Page 49

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
rouge-anti-virus-windowssafemode

‘Windows Safemode’ Is Not ‘Safe Mode’ by Windows

Windows Safemode is not the same as the Safe Mode by Windows. In fact, it is a rouge Windows program, being falsely advertised to protect your system when in fact it has no capability of detecting an error, or fixing…

THREAT REMOVAL
Ventir The New Backdoor Trojan for OS X

Ventir The New Backdoor Trojan for OS X

Researchers with the Russian multi-national security company Kaspersky have discovered a new OS X malware, dubbed Ventir. Reportedly it contains a keylogger, a Trojan, and a backdoor that allows the hackers to keep on accessing compromised machines. Reportedly, Ventir is…

THREAT REMOVAL
Zero-Access-Botnet

ZeroAccess Botnet – Is It Dead Yet?

What Is ZeroAccess? The ZeroAccess rootkit is a Trojan infecting Windows operating systems. The malware is also known as max++ or Sirefef and was first detected in the summer of 2011. The ZeroAccess botnet is to this day one of…

THREAT REMOVAL
The-Sandworm-Malware

The Sandworm Malware – How Dangerous Is It?

What Is the Sandworm Malware? The latest malware on the horizon, Sandworm, may have been named after the famous worm-like creature from the 60’s sci-fi classic Dune, but users should keep in mind that it is neither a worm, nor…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree