News tagged with trojan horse

Related topics:

Georgia Tech uncovers iOS security weaknesses

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications ...

Jul 31, 2013
3.5 / 5 (6) 0 | with audio podcast

Cyber-security expert finds new flaw in smartphones

Just as U.S. companies are coming to grips with threats to their computer networks emanating from cyber-spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.

Feb 24, 2012
4.9 / 5 (9) 3

Can an MP3 hack your car?

(PhysOrg.com) -- The idea that someone can get into your car without your permission isn't a new one. It's about as old as the coat hanger, but that was back in the days when you locks had a pull up button. ...

Mar 18, 2011 weblog
3.3 / 5 (3) 6 | with audio podcast

Android users get malware with their apps

(PhysOrg.com) -- As new platforms make their way into the market there will always someone who is looking to exploit them for illegal or unethical ends. More proof of that fact has come today when Google was ...

Mar 02, 2011 weblog
not rated yet 6 | with audio podcast

Wiretapping Skype calls: virus eavesdrops on VoIP

(AP) -- Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations ...

Sep 02, 2009
5 / 5 (4) 2