Archives - Trojan Protection


The first known ransomware appears in 1989

Several thousand floppy disks containing the AIDS Trojan, the first known ransomware, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a […]

What is Malware?

Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Most commonly, malware is designed to give attackers access to your infected computer. That access may allow […]

Beware: Brazil World Cup scams

While the world watches as Brazil World Cup 2014 started, the network crooks join in celebrating with campaigns aimed at football fans. Cyber criminals are very active in creating sophisticated Web sites posing as genuine World Cup sites, and sites of sponsors and partners of the event, including recognized and well-known brands, in an attempt […]

Kelihos: A good job for good pay!

Kelihos, is considered the HIV of all malware. This Trojan is really famous, and has been on TV and other media news reports and even has its own Wikipedia entry – http://en.wikipedia.org/wiki/Kelihos_botnet . The Kelihos family of Trojans is not only huge, but it is also impossible to conclude all its symptoms nor show all […]

Ruftar doesn’t slow down

The first sample of this huge ISF (information stealing family) of Trojans has been received from our customers at the year of 2011. Since then multiple variants of this family have been released, but most of them have been successfully detected by our product and system infection has been prevented. It has been three years […]

Would you like some payment advice?

Sometimes, our customers (from various geographical areas) are getting fake emails from HSBC banking with such a subject.The sender address may vary but this would be definitely spoofed email address.And the text of the email’s body may vary, then the main purpose is to confuse the recipients. For example: this is one of various possible […]