Search
Keyword: link
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Android OS
NOTES: This ransomware arrives via a malicious link in porn websites. After a user installs and opens it, it kills all apps except itself and system setting. It then displays a warning informing users that they suppos...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive information.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system. It co...
This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
As the world mourns the death of rock star icon David Bowie, cybercriminals are quick to leverage this tragic news for their social engineering ploys. Unlike spam runs where one can immediately see s...
A spam message that contains ransomware-related URLs has been spotted to make rounds in unsuspecting users' inboxes. The said spam poses to be an email invoice asking the user to click on the URLs t...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.