Keyword: link
300 Total Search   |   Showing Results : 221 - 240
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Troja...
This spyware searches the local drive of an infected system for MS Word and MS Excel documents. The collected documents are then archived and saved. It then uploads the created archive to the website, sendspace.com.To get a one-glance comprehensive ...
The sent messages contains a link where a copy of the malware may be downloaded.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
It sends messages to the friends of Facebook or Twitter users in an infected computer containing a link to a website hosting the malware TROJ_VBKRYPT.CB.This Trojan may be downloaded by other malware/grayware from remote sites.It uses Windows Task S...
This spammed message takes advantage of those looking for part-time or home-based jobs by offering high earnings. It contains a link which is already inaccessible when checked. Users should be wary of unbelievable offers and links...
SQL injection vulnerability in admin/campaign-zone-link.php in OpenX 2.8.10 before revision 81823 allows remote attackers to execute arbitrary SQL commands via the ids[] parameter in a link action. openx openx 2.8.10...
SQL injection vulnerability in admin/campaign-zone-link.php in OpenX 2.8.10 before revision 81823 allows remote attackers to execute arbitrary SQL commands via the ids[] parameter in a link action. openx openx 2.8.10...
A elevation of privilege vulnerability exists when Windows improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exp...
This spammed message pretends to be a normal newsletter. It invites users to click on a link that redirects to a fake pharmacy site. Users are advised not to click on links found on emails, instead head to the subscribed service's actual ...
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does no...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan accesses a certain URL to obtain the link where to download a file and its file name.It then executes the downloaded file. However, as of this writing, the said URL is no longer accessible.This Trojan arrives on a system as a file droppe...