gridinsoft-logo
  • Products
    • Anti-Malware
    • Trojan Killer [Portable Edition]
    • Trojan Scanner [Android Edition]
    • Comparison
  • Our Team
    • Find a Job
    • COURSES FOR DEVELOPERS
  • Resources
    • Tech News & Security Tips
    • Learn About Cybersecurity
    • Reviews
    • Help Center
    • Release History
  • Contacts
  • | Member Area |
  • DOWNLOAD NOW
  • CN
  • UA
Skip to content
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs
Logo

Tag: Trojan

  • Security News

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

imageByVladimir KrasnogolovyMay 18, 2022
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in information about the Russian invasion of Ukraine, infecting them with PowerShell RAT malware (more precisely, a remote access trojan) and stealing their data. Let me remind you that we wrote that Hacker groups

Read More

  • Security News

20 Dangerous Types of Cybersecurity Threats 2022

imageByStephanie AdlamApril 27, 2022
20 Dangerous Types of Cybersecurity Threats 2022
The cybersecurity threats in 2022 are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the

Read More

  • Gridinsoft Labs

Malware vs. Virus. Difference explained

imageByStephanie AdlamDecember 22, 2021
Malware vs. Virus. Difference explained
The topic of this small post is malware vs. virus conceptual clarification. We remember times when people used to call any harmful program a “virus”. Today this “malware” term popped out! How do these words correlate? People seem to use them freely

Read More

  • Security News

Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

imageByVladimir KrasnogolovyDecember 15, 2021
Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware
The latest of this year, December’s patch Tuesday brought fixes for six 0-day vulnerabilities in Microsoft products, including a bug in the Windows AppX Installer that uses Emotet malware to spread. Microsoft patched 67 vulnerabilities in its products this month, seven

Read More

  • Tips & Tricks

Coin Miner – What is it?

imageByPolina LisovskayaJanuary 27, 2021
Coin Miner – What is it?
Throughout the timeline of trojan virus evolution, it obtained a lot of different forms. Nowadays, they become global malware that can exploit your computer as it wants. In this article, I will tell you about the particular type of trojan virus – Trojan Coin Miners,

Read More

  • Security News

In August, the updated Qbot Trojan first entered the top of the most widespread malware

imageByVladimir KrasnogolovySeptember 15, 2020
In August, the updated Qbot Trojan first entered the top of the most widespread malware
Check Point has released its monthly Global Threat Index for August 2020. According to the researchers, the updated Qbot Trojan (aka QuakBot, Qakbot and Pinkslipbot) first entered the TOP of the most widespread malware in the world, where it took tenth place. Experts

Read More

  • Security News

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

imageByVladimir KrasnogolovyJuly 17, 2020
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study of a new Trojan on Android OS, called BlackRock. This malware is aimed stealing data from various applications, including dating applications, instant messengers, bank products, social networks and so on. In

Read More

  • Mobile Security
  • Security News

Fake COVID-19 contact tracking apps install banking trojans

imageByVladimir KrasnogolovyJune 12, 2020
Fake COVID-19 contact tracking apps install banking trojans
Researchers from California-based IS company Anomali have discovered 12 fake COVID-19 patient contact tracking apps posing as official programs. Attackers are actively exploiting the panic around the coronavirus pandemic to trick users into revealing their credentials. “Fake

Read More

  • Mobile Security
  • Security News

Xhelper Trojan remains on the device even after resetting to factory settings

imageByVladimir KrasnogolovyFebruary 14, 2020
Xhelper Trojan remains on the device even after resetting to factory settings
Xhelper malware continues to infect Android devices. Moreover, the Xhelper Trojan remains on the device even after deleting or completely resetting device to factory settings. According to Nathan Collier, Senior Malware Intelligence Analyst, Xhelper’s behavior is ushering in

Read More

  • Security News

Trojan Emotet is trying to spread through available Wi-Fi networks

imageByVladimir KrasnogolovyFebruary 10, 2020
Trojan Emotet is trying to spread through available Wi-Fi networks
Binary Defense analysts noticed that the new version of the Emotet Trojan behaves like a Wi-Fi worm, as it tries to spread and infect new victims through Wi-Fi networks available nearby. Researchers say that to detect the nearest Wi-Fi networks, the malware uses wlanAPI.dll

Read More

Posts navigation

Page 1 Page 2 NextNext page

Trending Articles

How To Reset Browser Settings?

June 23, 2018

How To Send System Information For Analysis

June 23, 2018

How To restore quarantined files?

June 15, 2018

Image
Use Strong Passwords to Can’t be Hacked Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses How annoying these messages are! My mailbox is flooded with these nasty offers, and I sometimes struggle to understand if the message is normal or spam!. Can I solve that?

Our Products:

  • Anti-Malware
  • Trojan Killer Portable
  • Android Trojan Scanner

Member Area:

  • Sign In

Solutions:

  • Spyware Remover
  • Ransomware Protection Tool
  • Virus Scanner & Removal Tool
  • Trojan Scanner & Removal Tool
  • Adware Removal Tool

Cybersecurity:

  • Spyware
  • Malware
  • Ransomware
  • Hacking
  • Darknet
  • Exploits
  • Antivirus
  • Adware
  • Backdoor
  • Botnet
  • Data Breaches
  • DDoS
  • Phishing
  • Trojan
Footer Logo
  • Terms of Use
  • Privacy Policy
  • How to Uninstall
  • How we use your data
Copyright © Gridinsoft LLC
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs

Latest Articles

  • Information Security Specialist Showed How to Steal a Tesla CarMay 19, 2022
  • Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT MalwareMay 18, 2022
  • Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM RelayMay 17, 2022
  • What Is Internet Protocol: IP Address DefinitionMay 16, 2022
  • What is SSL Certificate?May 16, 2022