Trojan horses News
January 04, 2016
Russia-based threat actors were accused of attacking media outlets and electric companies in Ukraine using BlackEnergy malware.
April 11, 2014
Microsoft's universal apps have developers and some IT admins interested in delivering Windows Phone 8.1 into the enterprise.
July 24, 2013
RSA is warning that a new banking Trojan, 'KINS,' with architectural similarities to previous Trojans, may start hitting PCs soon.
December 14, 2012
A Trojan horse waits for a left mouse click to execute each step of the infection process, according to new research from FireEye Inc.
Trojan horses Get Started
Bring yourself up to speed with our introductory content
Evaluate Trojan horses Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A Trojan called njRAT has emerged that is written in .NET rather than the traditional C/C++. Expert Nick Lewis explains how to detect and avoid the threat. Continue Reading
Manage Trojan horses
Learn to apply best practices and optimize your operations.
A variant of the Citadel malware emerged that compromises password management and authentication products. Enterprise threats expert Nick Lewis explains how to prevent and overcome the threat. Continue Reading
An updated, 64-bit version of the Zeus malware leverages Tor for C&C. What does this mean for enterprises? Nick Lewis discusses. Continue Reading
The Vobfus worm downloads variants of the Beebone Trojan and vice versa. Discover how to defend your enterprise from malware that downloads malware. Continue Reading
Problem Solve Trojan horses Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Fokirtor Trojan creates a dangerous backdoor in Linux systems. Learn how to keep enterprise Linux systems from being infiltrated and compromised. Continue Reading
An anti-sandboxing malware variant is defeating on-premises sandbox protection. Is sandbox security a thing of the past? Expert Nick Lewis discusses. Continue Reading
Learn how to analyze the Zeus config.bin file in order to identify targeted URLs and infected computers on your network. Continue Reading