+

Tagged With / 'Trojan'

August 23, 2013

Magazine News admin Comments Off
Hakin9_07_2013-1

Get Expert Skills on QR Code Hacking with Hakin9 Tutorials

Dear Readers, We are pleased to welcome you at the end of the summer period with a brand new issue. The issue that is supposed to be just a start in the area of QR code research. This is still a new topic and many people wouldn’t like to share their research and discoveries on […]

Read more

August 16, 2013

Magazine News NOTICE BOARD admin Comments Off
Hakin9_06_2013

Become an Expert in Advanced Malware Analysis – Read Hakin9′s Step-by-step Tutorials and Gain Ninja Skills!

Dear Readers, We are pleased that the new edition of Hakin9 Magazine just hit upon your computers, tablets, smartphones and e-book readers. This brand new issue will focus on, interesting for all, theme which is the Advanced Malware Analysis.           BASICS Setting Up Your Own Malware Analysis Lab By Monnappa KA […]

Read more

December 8, 2011


Fake Verizon email with malicious ZIP in circulation

Microsoft is warning users about a fake Verizon notification which is carrying a Trojan. The email appears to come from Verizon and attempts to make the customer feel a sense of urgency by claiming it contains crucial account information from verizon Wireless. The fake email has a ZIP file attached named ‘Verizon-Wireless-Account-StatusNotification_#######.zip’ (random numbers are […]

Read more

December 8, 2011


Brazilian banking Trojan disguised as Microsoft anti-virus software

A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals to silently steal online banking credentials. The Trojan affects ‘ntldr’ the default boot loader in Windows.The Trojan is propagating as an attachment on an email. This attack vector relies on the victim clicking on the […]

Read more

December 7, 2011

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

November 4, 2011


Malware using Windows Task Scheduler

Windows Task Scheduler (AT.exe) is well known to us all, but the Stuxnet worm has introduced the Zlob variants and click-fraud Trojan Bamital which researchers have found are continuing to make use of the Windows Task Scheduler. Some of this malware and new malware variants (including APT-attacks) are injecting malicious code into the Windows Task […]

Read more

October 27, 2011


Emma Watson Adobe Flash Trojan dropper in circulation

Emma Watson Adobe Flash malware in circulation. The latest of these videos purportedly features popular English actress Emma Watson and users from various websites are redirected to a very expertly made fake YouTube pages where the video is supposedly hosted, complete with comments, “Like” and “Share” buttons and related videos on its right. But unfortunately […]

Read more

October 20, 2011


Flashback Trojan targets Apple Mac OS X Lion

A new variant of a nasty Apple Mac Trojan has been found in the wild. Picking up where its predecessor left off, the tweaked Trojan can disable the anti-virus software built into recent versions of Apple’s Mac OS X Lion. The Trojan, called “Flashback,” now rewrites the code that governs Apple’s XProtect anti-malware program, wiping out […]

Read more

October 7, 2011


SpyEye banking Trojan uses SMS hijacking feature

SpyEye has been observed trying to trick users into reassigning their cellphone numbers to receive one-time passwords (OTP) from their banks by SMS. The social engineering scam (assuming SpyEye has already infected the target PC) is found on fraudulent pages injected into a users online banking session that falsely claim they have been assigned a […]

Read more

September 29, 2011


Apple updates OS X to block Mac Trojan

Apple has updated the Bare bone antivirus protection along with Mac OS X protection to detect the Trojan Virus, which poses as PDF documents. Apple has included the Xprotection feature in the Mac OS X 10.6, Mac OS X 10.7. The new updated security will identify the Trojan viruses, which are known as Revir A […]

Read more

November 1, 2010


A Brief Analysis of the Cyber Security Threat

A definition of cyber security Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber attacks. Each of these threat vectors’will need to be addressed by a country’s citizens, its […]

Read more

September 1, 2010


Study of a New Genre of Malwares Called “Scarewares”

Depending on their characteristic, Malware can be broadly classified into various types. Most of us are probably aware of the common terms like Virus, Trojan, Spyware, Adware etc. Author: MICHAEL R. HEINZL Source: Hakin9 9/2010 https://hakin9.org However, on the basis of certain behavioral traits, further classification of these broad types is possible. For example, based on […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa