Keyword: ad
300 Total Search   |   Showing Results : 81 - 100
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This mobile malware presents itself as a fake copy of certain game apps. It displays advertisements. It can also navigate the app store to install other unrelated apps.
Cookies may also be used by malware to gather information related to site preferences, sessions or other computer activities. For example, WORM_KOOBFACE makes use of cookies related to social networking sites, such as Facebook and Twitter, to allow t...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Background One of the major threat stories in 2013 was the sudden increase in Tor users in August that year. The MEVADE/SEFNIT botnet was the culprit—with the adoption of the Tor module i...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Adware drops and runs other files on the device. It displays pop-up advertisements.
This potentially unwanted application may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as o...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Database Microsoft SQL1000917* - Restrict Microsoft SQL Server XP_CMDSHELL ProcedureMySQL Cluster NDBD1011389 - Oracle MySQL Cluster Data Node Informati...
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It may be hosted on a website and run when a user accesses the said we...
This Android malware arrives as a fan-made application that tricks users into thinking that it is the same as the original. It displays advertisements upon installation. To get a one-glance comprehensive view of the behavior of this Trojan, refer to ...
This hacking tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. It may be manually installed by a ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It does not have any propagati...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.