Archives - Trojan Protection


Install and use antivirus software

Installing an antivirus software program and keeping it up-to-date is a critical step in protecting your computer. Many types of antivirus software can detect the presence of malware by searching for patterns in your computer’s files or memory. Antivirus software uses signatures provided by software vendors to identify malware. Vendors frequently create new signatures to […]

A quick guide to banking Trojans

Online banking is supposed to be convenient and secure,  and most of the time, it is. Consumers have come to regard apps from their banks as trustworthy alternatives to visiting a branch. According to multiple surveys compiled by the U.S. Federal Reserve, adoption of online banking including mobile apps has been climbing steadily for years, […]

On this day in history – Graybird a Trojan horse also known as Backdoor appears

April 2, 2003: Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P (the most recently discovered variation). It affected Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, […]

Types of Malware: What is malicious code?

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

The Worst Malware of 2018

In our year-end roundup of the worst malware threats of 2017, we compared malware to actual biological viruses, in that both are ever-evolving phenomena. For example, you know how it’s recommended for certain demographics to get a flu shot every year?  The rationale is simple: The flu virus itself is never identical from year to year, meaning that […]

On this day in history – backdoor trojan Bitfrost infects Windows

October 12, 2004: Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 10 (although on modern Windows systems, after Windows XP, its functionality is limited). Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the […]