Security Stronghold threat catalog
Worm | Rat | Trojan | Malware | Adware | Virus | Hijacker | Parasite | Badware | Keylogger | Spyware | Downloader | Dialer | Toolbars | Pop-ups | Ransomware | Rogue Software | Cookies
Threats type: Trojan
Whisper
Whistler Virus Win.Trojan.Symmi Win32 Bifrose Win32.Agent.ADB Win32.Alcena.Downloader Win32.Androm Win32.Andromeda Win32.Backdoor.BeastDoor Win32.Backdoor.Bifrose Win32.Backdoor.BlackHole Win32.Backdoor.CiaDoor Win32.Backdoor.Hupigon Win32.Backdoor.IRCBot Win32.Backdoor.IRCZapchast Win32.Backdoor.Jeem Win32.Backdoor.Lixy.B Win32.Backdoor.Nethief Win32.Backdoor.Padodor Win32.Backdoor.PcClient Win32.Backdoor.Poison Win32.Backdoor.Ranky Win32.Backdoor.Rbot.gen Win32.Backdoor.SDBot Win32.Backdoor.SubSeven Win32.Backdoor.VanBot Win32.Backdoor.VB Win32.Bamital Win32.Beaugrit Win32.Benuti.Trojan The term "Trojan horse" or "trojan" came from the story of capturing Troy by ancient Greeks. A malicious program related to trojan masks itself as a valid program and in contrast to viruses doesn’t create multiple instances of itself. Trojan itself is responsible to unauthorized access to the host machine. Hiding behind useful programs trojan performs undisclosed malicious actions. Trojan is the two-faced Janus which makes evil under the mask of good. There are some functional types of trojans subject to its malicious actions: Downloader/dropper, Denial-of-service attack (DoS), Data Destruction, Remote Access, Server Trojan (Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.), Disable security software. To get rid of all kinds of trojans you may download Stronghold AntiMalware and be sure in your protection. ... [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] Security Stronghold threat catalog: 957, current: 781 — 810 |
Copyright © 2024 Security Stronghold. All Rights Reserved. All content on this website is protected and belongs to Security Stronghold LLC.