Trojan - Page 46

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
Malicious Messages Offering Free Steam Games

Malicious Messages Offering Free Steam Games

Short Description of Steam Messages Numerous users of the game distribution platform Steam have reportedly received messages like “Is this you in the photo?”, “WTF Dude?” and “You will exchange this thing?”. These users should know that they have probably…

THREAT REMOVAL
Trojan.Cryptlock.J!gm

Trojan.Cryptlock.J!gm

What Is Trojan.Cryptlock.J!gm? Security experts rate Trojan.Cryptlock.J!gm as a low-level risk infection. Once active on the compromised computer, Trojan.Cryptlock.J!gm will run in the background and consume a lot of the system’s resources. Trojan.Cryptlock.J!gm may cause a slowdown in the system’s…

CYBER NEWS
Poweliks Trojan Delivered Through Spam Emails

Poweliks Trojan Delivered Through Spam Emails

Experts report that the number of computers infected with Poweliks Trojan has been growing recently. The primary distribution technique at the moment is through spam, but the cyber criminals are using other methods as well. Details on the Poweliks Trojan…

THREAT REMOVAL
rouge-anti-virus-windowssafemode

‘Windows Safemode’ Is Not ‘Safe Mode’ by Windows

Windows Safemode is not the same as the Safe Mode by Windows. In fact, it is a rouge Windows program, being falsely advertised to protect your system when in fact it has no capability of detecting an error, or fixing…

THREAT REMOVAL
Ventir The New Backdoor Trojan for OS X

Ventir The New Backdoor Trojan for OS X

Researchers with the Russian multi-national security company Kaspersky have discovered a new OS X malware, dubbed Ventir. Reportedly it contains a keylogger, a Trojan, and a backdoor that allows the hackers to keep on accessing compromised machines. Reportedly, Ventir is…

THREAT REMOVAL
Zero-Access-Botnet

ZeroAccess Botnet – Is It Dead Yet?

What Is ZeroAccess? The ZeroAccess rootkit is a Trojan infecting Windows operating systems. The malware is also known as max++ or Sirefef and was first detected in the summer of 2011. The ZeroAccess botnet is to this day one of…

THREAT REMOVAL
The-Sandworm-Malware

The Sandworm Malware – How Dangerous Is It?

What Is the Sandworm Malware? The latest malware on the horizon, Sandworm, may have been named after the famous worm-like creature from the 60’s sci-fi classic Dune, but users should keep in mind that it is neither a worm, nor…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree