Health.Zone Web Search

  1. Ads

    related to: scan for remote access trojan
  2. trustedantiviruscompare.com has been visited by 100K+ users in the past month

Search results

  1. Results from the Health.Zone Content Network
  2. Agent Tesla | Wikipedia

    en.wikipedia.org/wiki/Agent_Tesla

    Agent Tesla. Agent Tesla is a remote access trojan (RAT) written in .NET that has been actively targeting users with Microsoft Windows OS-based systems since 2014. It is a versatile malware with a wide range of capabilities, including sensitive information stealing, keylogging and screenshot capture. Since its release, this malicious software ...

  3. PoisonIvy (trojan) | Wikipedia

    en.wikipedia.org/wiki/PoisonIvy_(Trojan)

    PoisonIvy (trojan) PoisonIvy is a remote access trojan that enables key logging, screen capturing, video capturing, file transfers, system administration, password theft, and traffic relaying. [1] It was created around 2005 by a Chinese hacker [2] and has been used in several prominent hacks, including a breach of the RSA SecurID authentication ...

  4. Havex | Wikipedia

    en.wikipedia.org/wiki/Havex

    Havex malware, also known as Backdoor.Oldrea, is a Remote Access Trojan (RAT) employed by the Russian attributed APT group "Energetic Bear" or "Dragonfly". [1] [2] Havex was discovered in 2013 and is one of five known ICS tailored malware developed in the past decade.

  5. Trojan horse (computing) | Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    Computer hacking. In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1]

  6. Malware | Wikipedia

    en.wikipedia.org/wiki/Malware

    A backdoor is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge. [38] The attacker typically uses another attack (such as a trojan , worm or virus ) to bypass authentication mechanisms usually over an unsecured network such as the Internet to ...

  7. Timeline of computer viruses and worms | Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    The Trojan was able to evade usual system scanners. Kedi Trojan had all the characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via Gmail using common HTML, HTTP protocols. [107] [108]

  1. Ads

    related to: scan for remote access trojan