Keyword: glossary.asp
2324 Total Search   |   Showing Results : 101 - 120
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This Trojan drops the following copies of itself into the
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This worm drops the following copies of itself into the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This Trojan drops the following copies of itself into the
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This spyware steals particular information and sends it to certain URLs via HTTP POST. It terminates itself if it finds certain processes in the affected system's memory. This spyware arrives on a
This Trojan may be injected into processes running in memory. It modifies registry entries to enable its automatic execution at every system startup. It modifies the affected system's HOSTS files.
This spyware may be dropped by other malware. It steals sensitive information such as user names and passwords related to certain games. Arrival Details This spyware may be dropped by other malware.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
NFLOG variants are capable of executing commands from remote malicious users. Remote malicious users can compromise the affected machine by executing the following commands: Download files Perform
NFLOG variants are capable of executing commands from remote malicious users. Remote malicious users can compromise the affected machine by executing the following commands: Download files Perform
NFLOG variants are capable of executing commands from remote malicious users. Remote malicious users can compromise the affected machine by executing the following commands: Download files Perform
This spyware may be dropped by other malware. It steals sensitive information such as user names and passwords related to certain games. Arrival Details This spyware may be dropped by the following
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user. Infection Points This spyware arrives as a file downloaded from the following URLs:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a