Trojan horses News
April 11, 2014
Microsoft's universal apps have developers and some IT admins interested in delivering Windows Phone 8.1 into the enterprise.
July 24, 2013
RSA is warning that a new banking Trojan, 'KINS,' with architectural similarities to previous Trojans, may start hitting PCs soon.
December 14, 2012
A Trojan horse waits for a left mouse click to execute each step of the infection process, according to new research from FireEye Inc.
October 06, 2004
Sarbanes-Oxley contains many features, but there are two that stand out from an IT security perspective.
Trojan horses Get Started
Bring yourself up to speed with our introductory content
Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. A Trojan Horse is programming that appears to be legitimate but actually hides an attack. Continue Reading
A wiretap Trojan is a program that surreptitiously records VoIP calls. Continue Reading
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. Continue Reading
Manage Trojan horses
Learn to apply best practices and optimize your operations.
The Vobfus worm downloads variants of the Beebone Trojan and vice versa. Discover how to defend your enterprise from malware that downloads malware. Continue Reading
The Mac OS X vs. Windows debate will likely never be resolved, but that won't stop expert Michael Cobb from giving it his best shot. Our platform security expert explains how each operating system combats malware. Continue Reading
Problem Solve Trojan horses Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn how to analyze the Zeus config.bin file in order to identify targeted URLs and infected computers on your network. Continue Reading
The beauty of split tunneling is that an enterprise doesn't need to provide the general Internet access point for a VPN user. Mike Chapple, however, also explains why split-tunnel VPNs provide a false sense of security. Continue Reading