Keyword: a virtual card for you
300 Total Search   |   Showing Results : 141 - 160
Trend Micro received samples of delivery notification purportedly from FedEx. Its appearance and contents are almost indentical to the legitimate FedEx email notification. The message contains speci...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This hacking tool may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It hacks a computer by running a ...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to Internet Relay Chat (IRC) servers. It executes commands from a remote malicious user, effe...
This backdoor is a Trojanized copy of a legitimate gaming application for Android OS smartphones. It steals sensitive information of the affected phone's SMS and calls functions, compromising the security of the device and of the user.To get a one-gl...
Remote Desktop Protocol (RDP) is a feature that ships with most Microsoft operating system versions. Its primary use is to facilitate an easy connection between two computers over a network....
Trend Micro received samples of an email message that poses as a letter from Reader's Digest India. It informs recipients that they are potential finalists of a supposed sweepstakes. The message the...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It requires its main component to succe...
This Trojan may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. Once a user visits an affected Web page, this H...
This Trojan may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. Once a user visits an affected Web page, this H...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
This backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any i...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This backdoor connects to specific IRC server and joins a particular IRC channel.It is capable of receiving and executing specific commands from the IRC server.This backdoor arrives on a system as a file dropped by other malware or as a file downloa...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects ...
Microsoft addresses the following vulnerabilities in its December batch of patches:(MS10-090) Cumulative Security Update for Internet Explorer (2416400)Risk Rating: CriticalThis security updat...