Software  >   Malware  >  

Trojan Horses

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A talking Trojan is a Trojan horse that mocks the user of an infected PC with a repeating audio message while it deletes the entire contents of a hard drive. Security vendor Panda Software SA detected the first talking Trojan, BotVoice.A, in the summer of 2007.PandaSoft warns that infection can occur through multiple vectors, including:through physical storage devices like USB flash drives,  … 
Definition continues below.
Trojan Horses Reports
26 - 29 of 29 Matches Previous Page  |  Next Page
Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007


Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.
26 - 29 of 29 Matches Previous Page    1 2    Next Page
TROJAN HORSES DEFINITION (continued): …  smartphones, iPods or CD-ROMsdirectly through a download initiated by other malware or from malicious Web pagesover P2P networks.Once the talking Trojan has been installed, the application uses the Windows text reader to play the following text:"You have been infected. I repeat you have been infected and your system files has [sic] been deleted. Sorry. Have a nice day and bye bye."The Trojan prevents certain file types from running. Disabled file extensions include BAT, COM, EXE and MP3. BotVoice.A also disables the Windows registry editor and the Task Manager which can … 
Trojan Horses definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement