Avatar Rootkit Uses Yahoo Groups for C&C Communications

Avatar Rootkit Uses Yahoo Groups for C&C Communications

ESET experts have performed an analysis of the rootkit family

F-Secure Online Scanner Removes Advanced Rootkits

F-Secure Online Scanner Removes Advanced Rootkits

Portable, light, fast, detects and removes advanced rootkits

Security App of the Week: Bitdefender Rootkit Remover

Security App of the Week: Bitdefender Rootkit Remover

A powerful tool that can help you get rid of those nasty threats

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Experts from Kaspersky and CrowdStrike have analyzed the new threat

Video: Researchers Develop Rootkit to Highlight Flaws in Android 4.0.4

Video: Researchers Develop Rootkit to Highlight Flaws in Android 4.0.4

The malware could replace the legitimate browser with a malicious one

World War 3 Scam Spreads Rootkit Using Facebook

World War 3 Scam Spreads Rootkit Using Facebook

The scam warns that the US began a war against Iran and Saudi Arabia

Pro Evolution Soccer 2012 Videos Hide ZeroAccess Rootkit

Pro Evolution Soccer 2012 Videos Hide ZeroAccess Rootkit

A sophisticated scam in which cybercriminals earn money and access to your device

Antivirii 2011 Scares Users With Fake Infections

Antivirii 2011 Scares Users With Fake Infections

Another piece of scareware has been spotted by security experts

Handset Vendors and Operators Confirm Using Carrier IQ

Handset Vendors and Operators Confirm Using Carrier IQ

Apple, HTC, Samsung, AT&T and Sprint admit to using the rootkit

New Rootkit Infects NTFS Loader

New Rootkit Infects NTFS Loader

  • Security
  • By Lucian Constantin
  • February 26th, 2011
New Banking Trojan Targets All Major Browsers

New Banking Trojan Targets All Major Browsers

  • Security
  • By Lucian Constantin
  • August 7th, 2010
Stuxnet Doubles as SCADA Sabotage Tool

Stuxnet Doubles as SCADA Sabotage Tool

It injects hidden rogue code in critical systems

 
Want more? Browse: