Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Esther Shein - Article Archives - Page 1
3/10: BackDoor-CEP.gen Trojan Drops Files Into Directory
March 10, 2009
BackDoor-CEP.gen is a Trojan that installs itself into the %WINDIR%\System32 directory as server.exe or another file name.
2/23: DelfInj-B Trojan Gives Remote Intruder System Access, Control
February 23, 2009
Troj/DelfInj-B is a Trojan for the Windows platform.
2/19: Mal/WaledPak-B Worm Family Creates Registry Entry
February 19, 2009
Mal/WaledPak-B is a family of worms for the Windows platform.
2/10: Waledac.AJ Trojan Steals Information, Uploads It to Websites
February 10, 2009
Win32/Waledac.AJ is a Trojan that can steal information such as email addresses from affected systems and upload it to remote websites.
1/28: SillyBHO.BF Trojan Installs Other Malicious or Unwanted Files
January 28, 2009
Win32/SillyBHO.BF is a Trojan that registers itself as a Browser Helper Object (BHO) and installs other malicious or unwanted files on the system.
Downadup: The Web's Next Big Threat?
January 26, 2009
Experts blame a lack of patching and an advanced design for the rise of a worm that could outpace Storm.
12/29: Agent-IMG Trojan Runs Continuously in Background
December 29, 2008
Troj/Agent-IMG is a Trojan for the Windows platform.
12/18: AutoRun.UCO Worm Spreads on Fixed, Removable Drives
December 18, 2008
W32/AutoRun.UCO is a Windows system worm that propagates on local fixed and removable USB drives.
Apple Patches 21 Security Glitches
December 17, 2008
Latest Apple patch haul includes some late fixes for Adobe Flash.
11/19: Magania.AKCP Trojan Drops Files, Modifies Registry
November 19, 2008
W32/Magania.AKCP is a Trojan that will infect Windows systems.
11/18: Dwnldr-HKT Drops, Runs Code From Internet
November 18, 2008
Troj/Dwnldr-HKT attempts to download and run code from the internet, without the users permission.
11/17: ClckCsh-A Trojan Redirects Users to Website
November 17, 2008
Troj/ClckCsh-A Trojan will redirect users to a website offering ways to make lots of money.
10/14: FakeAle-IJ Trojan Creates Files, Registry Entries
October 14, 2008
Troj/FakeAle-IJ is a Trojan for the Windows platform.
6/17: Bdoor-ALX Trojan Contacts Remote Server Via Http
June 17, 2008
Troj/Bdoor-ALX is a Trojan for the Windows platform.
4/11: Bkdr_PoisonIV.QI Backdoor Opens Random Port
April 11, 2008
Bkdr_PoisonIV.QI is a backdoor that may be downloaded from remote sites by a malware detected by Trend Micro as EXPL_NEVAR.B.
4/7: Dwnldr-ZLG Trojan Copies Itself, Runs
April 7, 2008
Troj/Dwnldr-ZLG is a Trojan for the Windows platform.
4/1: Proxy-Fireby Trojan Used by Malware Authors to Control System
April 1, 2008
Proxy-Fireby is a Trojan that could be used by malware authors to remotely control the machine.
3/14: Agent-GSP Trojan Creates Registry Entries
March 14, 2008
Troj/Agent-GSP is a Trojan for the Windows platform.
2/11: Botou Worm Copies Itself to All Drives
February 11, 2008
W32.Botou is a worm that copies itself to all drives on the compromised computer.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.