Health.Zone Web Search

  1. Ads

    related to: remote access trojan software
  2. trustedantiviruscompare.com has been visited by 100K+ users in the past month

Search results

  1. Results from the Health.Zone Content Network
  2. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    v. t. e. In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1]

  3. Agent Tesla - Wikipedia

    en.wikipedia.org/wiki/Agent_Tesla

    Agent Tesla is a remote access trojan (RAT) written in .NET that has been actively targeting users with Microsoft Windows OS-based systems since 2014. It is a versatile malware with a wide range of capabilities, including sensitive information stealing, keylogging and screenshot capture. Since its release, this malicious software has received ...

  4. DarkComet - Wikipedia

    en.wikipedia.org/wiki/DarkComet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur (known as DarkCoderSc), an independent programmer and computer security coder from France.. Although the RAT was developed back in 2008, it began to proliferate at the start

  5. Remote desktop software - Wikipedia

    en.wikipedia.org/wiki/Remote_desktop_software

    A remote access trojan (RAT, sometimes called creepware) is a type of malware that controls a system through a remote network connection. While desktop sharing and remote administration have many legal uses, "RAT" connotes criminal or malicious activity.

  6. China-linked group uses malware to try to spy on commercial ...

    www.aol.com/news/china-linked-group-uses-malware...

    The “remote access trojan” type of malware allows an attacker to gain full access to a device and issue commands, after breaking in through an email, a malicious website, vulnerable software ...

  7. PoisonIvy (trojan) - Wikipedia

    en.wikipedia.org/wiki/PoisonIvy_(Trojan)

    PoisonIvy (trojan) PoisonIvy is a remote access trojan that enables key logging, screen capturing, video capturing, file transfers, system administration, password theft, and traffic relaying. [1] It was created around 2005 by a Chinese hacker [2] and has been used in several prominent hacks, including a breach of the RSA SecurID authentication ...

  1. Ads

    related to: remote access trojan software