Keyword: a virtual card for you
300 Total Search   |   Showing Results : 221 - 240
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes the downloaded fil...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes the downloaded fil...
This malware is a component of a malicious Java archive file (.JAR). It takes advantage of a stack-based buffer overflow in a function in Java Runtime Environment (JRE) that allows remote attackers to execute arbitrary code. More information can be f...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website.This is the Tren...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It executes the downloaded files. As a re...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It executes the downloaded files. As a re...
Fox News, a popular American news channel, is currently being used as a front for a 'work-at-home' scam. Email message such as this one lure people to read a supposedly legitimate article with a true...
This Trojan checks if the operating system used on the affected system is Windows. If so, it downloads a possibly malicious file from where it is hosted and saves the said file as %User Temp%\{random file rame}.exe. It then executes the downloaded f...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It executes the downloaded files. As a re...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This PHP script Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, result to malicious routines. Specifically, it makes use of Facebook to post links to malicious websites.To get a o...
Microsoft addresses the following vulnerabilities in its February batch of patches:(MS10-003) Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution (978214) Risk Rating: ...
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. This is the Trend Micro detection for Web pages...
DIPLE malware, also known as BeeBone, connect to several URLs to download other malicious files onto infected systems. As such, the routines of the downloaded files are exhibited on the systems causing further infection. This Trojan arrives on a sys...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specifi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires being executed with a specific argument/parameter, an additional component, or in a specific en...
DIPLE malware, also known as BeeBone, connect to several URLs to download other malicious files onto infected systems. As such, the routines of the downloaded files are exhibited on the systems causing further infection. This Trojan arrives on a sys...