Latest News
EPA Victoria hones its strategic workforce planning
UNSW to offer ChatGPT Edu to 10,000 staff
First npm worm "Shai-Hulud" released in supply chain attack
Effective resilience requires more than just security tools
Woodside Energy sets up a unified enterprise data platform
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
trojans
trojans
Trojans posing as rare Saddam Hussein execution videos
Keeping with their practice of tailoring malware-toting email for current events, malicious users are mass mailing what they claim is a rarely-seen video of the execution of Saddam Hussein.
Frank Washkuch
Jan 9 2007 4:46PM
Security
Trojans account for over half of malware
Over 54 percent of the new malware in the second quarter of 2006 were trojans, according to new data.
René Millman
Jul 14 2006 11:41AM
Security
Microsoft: Trojans, rootkits the new top threats
Backdoor trojans and rootkits represent two of the fastest growing malware expunged by Microsoft's Windows Malicious Software Removal Tool (MSRT), which was unveiled in January 2005.
Dan Kaplan
Jun 12 2006 9:49PM
Security
Industry clamps down on custom trojans
A network of websites used by cyber criminals to create and sell custom-designed trojans used for corporate espionage and ID theft has been shut down after a concerted effort by IT security firms.
William Eazel
Mar 9 2006 9:59AM
Security
Crimeware code sells trojans to hackers
Security experts have detected a new crimeware creation system that sells made-to-measure trojans to hackers for $990.
William Eazel
Feb 27 2006 10:05AM
Security
Trojans found exploiting Sony DRM application
Researchers have discovered the first trojan to take advantage of Sony's controversial copy protection software.
René Millman
Nov 10 2005 2:59PM
Security
Game on as first PSP and Nintendo Trojans emerge
Security experts today warned that the first examples of malicious code designed to infect videogame consoles has been discovered in the wild.
William Eazel
Oct 24 2005 1:05PM
Security
The new breed of trojans
A sinister new trend is emerging, with specially crafted trojans targeted at individual companies. The threat reveals the use of malware in industrial or even state-sponsored espionage.
René Millman
Jul 22 2005 3:17PM
Security
New Trojans target online banks
Security experts have discovered a group of previously undocumented Trojan horses which target British users of online banking services by attempting to steal sensitive financial information.
Robert Jaques
Sep 7 2004 2:17PM
Security
Phishing attacks include Trojans
Phishing attackers are now including Trojan code, which could log keystrokes and capture passwords.
Jon Tullett
Aug 16 2004 2:44PM
Security
Trojans = Double Trouble
Trojan Horse applications (Trojans for short) are not new, having been around for over ten years now, but amazingly no-one has found a way to manage the threat.
Gunter Ollmann
Jan 9 2004 2:55PM
Security
Previous
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
Queensland Rail uses SuccessFactors to "put learning back on the map"
Medibank targets central system to handle people queries
Cyber Security Roadshow: Digital As Usual 2025
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Sydney and Melbourne rank highly for "citizen experience"
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?