choose content

Choose content

Enter keywords to create a newsletter
create account

Create account

Enter your registration information
set preferences

Set preferences

Set up your newsletter name, delivery and time zone preferences
Hint: Enter different keywords to generate new results.

Now you can:

  1. Search the news index.
  2. Browse more than 1 million newsletters by category.
  3. Use preset newsletters:
    • Trojan Horse

Trojan Horse Newsletter
  • Austrian government adopts communications security package with federal Trojan horse 23 Feb 2018 10:37 GMT

    … so-called federal Trojan horse; IT experts warn against such supervision software, which makes …

  • What is malware? Everything you need to know about viruses, trojans and malicious software 28 Feb 2018 12:29 GMT

    … for 'malicious software'. It is software developed by cyber attackers … - the Trojan horse - is a form of malicious software which often … as the Greeks used a Trojan Horse to trick Troy into letting … anti-malware protection. The power of Trojan horses makes it a useful tool …

  • 'A stitch in time saves nine' — Mitigating security breach 23 Mar 2018 09:22 GMT

    … , we still use the term Trojan Horse or Trojan to designate a … in every step of the software development lifecycle in the company …

  • Trojan horse removal: Protecting Troy 30 Sep 2017 10:55 GMT

    Trojan horses are similarly deceptive. In computer terms, a Trojan horse is any malicious software … . How do Trojan horses work? Even often referred to as trojan horse virus, there … . Downloaded software Trojan horses are frequently uploaded to websites that provide free software both …

  • This WannaCry-Like Trojan Horse Uses Your Computer’s Resources to Mine for Money 30 May 2017 17:01 GMT

    Adylkuzz is a piece of malicious software that doesn’t encrypt your files or demand that you pay a ransom. It doesn’t steal your emails or erase your data. It sits hidden in your computer, a background process that would look legitimate to the naked eye, …

  • The ultimate Linux Trojan horse: Windows Subsystem for Linux 17 May 2017 15:33 GMT

    … to "sneak" free software into an organization that I … install, run and support Linux-based software across an organization, the easier … rely on said software. As the usage of Linux software increases, the … Linux one of the greatest Trojan horses in computing history.  Plus, as …

  • Trojan horse compromises Handbrake software 09 May 2017 01:30 GMT

    … with one containing a trojan horse. The compromised software was available for download … good analysis of what the trojan horse does: As with KeRanger and … distribution website of legitimate macOS software. With access to HandBrake…

  • Outraged Programmers Forced a Rare Concession From Facebook on Its Open-Source Software 29 Sep 2017 19:26 GMT

    … any party relating to the Software. Notwithstanding the foregoing, if Facebook … deterrent that some considered a Trojan horse, injected by Facebook into thousands … last July when the Apache Software Foundation declared React incompatible with …

  • Is a Trojan Horse the Key to Curing Cancer? 12 Apr 2017 18:42 GMT

    … a Trojan Horse. This was the mission of Theralase Technologies: finding a Trojan Horse … what? To be a cancer-killing Trojan Horse, able to destroy cancer cells … : training, an extended warranty, full software support, marketing support, and patient …

  • CCleaner Attack Shows Need to Bolster Software Development Security 28 Sep 2017 00:45 GMT

    … seek to turn legitimate software programs into Trojan horses that can compromise millions … by many software-security professionals: The software development process needs to be … signature is not proof against software supply-chain attacks. Digital signatures are …

Satisfied with the content?

Continue to create your account.