Keyword: unauthorized file encryption
1526 Total Search   |   Showing Results : 61 - 80
Microsoft Exchange Server Outlook Web Access is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform ce...
Apache Struts2 is prone to a remote arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input. Attackers can exploit this issue to...
The Asterisk Recording Interface is prone to the following issues: 1. Multiple security bypass vulnerabilities. 2. A cross-site request-forgery vulnerability. 3. A cross-site scripting vulne...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine r...
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of...
This spyware may arrive bundled with malware packages as a malware component. It may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by user...
An improperly issued subordinate CA certificate that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks...
An improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. The SSL cert...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is the Trend Micro detection for Business Email Compromise (BEC). It is a sophisticated scam carried out by social engineering to make the email look legitimate and conduct unauthorized wire transfer payments, request private business data, etc....
When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sens...
This Trojan forwards any received SMS to a specific number and sends SMS by keywords. It is controlled remotely via SMS to send SMS or write SMS to Inbox. It leverages a vulnerability in the China Mobile SMS Payment process to steal banking credentia...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine ...
WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability. An attacker can exploit these issues to gai...
A certain ActiveX control in sapi.dll (aka the Speech API) in Speech Components in Microsoft Windows Vista, when the Speech Recognition feature is enabled, allows user-assisted remote attackers to delete arbitrary ...
Android OS NOTES: This malware disguises itself as a bank dynamic token generator, which may fraud bank customers. It is running another background service that monitors user's incoming SMS. Every incoming SMS is silently sent...
This malware shows a fake infection on the affected user's mobile phone. Once the user clicks on the fake infection, it automatically downloads another app. The downloading uses network data and causes unauthorized spending.