Security News

Ongoing Campaign Delivers Redaman Banking Trojan
2019-01-24 18:01

Spam campaigns that have active during the last several months have been distributing the Redaman banking malware, Palo Alto Networks security researchers say.  read more

Trojan malware is back and it's the biggest hacking threat to your business
2019-01-23 12:59

Old school but effective, hackers are shifting aware from in-your-face ransomware to attacks that are much more subtle.

MobSTSPY Info-Stealing Trojan Goes Global Via Google Play
2019-01-03 17:45

Across six apps, the spyware managed to spread to 196 different countries.

Russian Cyberspies Build 'Go' Version of Their Trojan
2018-12-19 17:17

The Russian-linked cyber-espionage group Sofacy has developed a new version of their Zebrocy tool using the Go programming language, Palo Alto Networks security researchers warn. read more

Popular Banking Trojans Share Loaders
2018-12-19 08:23

Several well-known banking Trojans that have been around for several years have shared loaders, Trend Micro security researchers have discovered.  read more

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting
2018-12-16 18:26

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the...

Android Trojan Targets PayPal Users
2018-12-12 21:21

The trojan purports to be a battery optimization app - and then steals up to 1,000 euro from victims' PayPal accounts.

Android Trojan steals money from victims’ PayPal account
2018-12-12 06:45

ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s PayPal address. The...

Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits
2018-12-10 15:16

Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based...

Trojan Horses for the Mind
2018-12-07 14:59

When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.