- There are many malicious code targeting eBay

ebay users are suffering from an attack from an extremely dangerous trojan. security firm symantec said within a week trojan.bayrob has modified up to 3 times to avoid detection and destruction.
- Trojans appear to attack Microsoft Office

security experts have warned of a new trojan that appears to be able to attack an unpatched microsoft office security vulnerability that could allow hackers to hack into computers.
- Appeared Trojan Horse virus attacks Mac computers

network security company intego has alerted a new trojan horse virus called osx.rsplug. one special thing is that this virus specializes in attacking mac computers. trojans are a type of dnschanger that can change the address of the provider
- 5 mobile security risks you need to avoid

here are the most used mobile attack methods of 2018. let's find out and see these new digital wave protections.
- 2007: Super sophisticated Trojan will be raging

the extremely sophisticated technique that this trojan uses will become popular in 2007, a security expert warns. named 'rustock', the later trojan family first appeared nearly a year ago.
- Neprodoor trojan warning appears in Vietnam

users of domestic computers have been warned about a new type of dangerous trojan named neprodoor originating from russia, which has appeared and spread on computers in vietnam.
- Apple fake Trojan sales announcement

security firm sophoslabs has warned about the spread of a backdoor trojan called troj / downdec-a. this trojan takes advantage of an apple sales announcement (about the ipod) to attack a user's computer.
- Again appeared kidnapping trojans

security firm sophos yesterday warned users of a new 'kidnapping' trojan that requires users to pay $ 10.99 to stop deleting files on the infected system.
- What is Trojan? How to avoid Trojan horse virus

a trojan or trojan horse is a type of malicious code or software that can take control of a user's computer remotely.
- What is Trojan Dropper?

one particular program used by cyber criminals in their illegal transactions is the trojan dropper program. so how does this happen and how can you prevent it?