Some have stolen, data corrupted, strokes PC Ian After a highly-sensitive operation to locate where Trojan horse
malware exists, Cleveland Police say the areas most affected on Teesside are: |Linthorpe in Middlesbrough, with 600 potential at-risk computers.
There are 17 variants of the RSPlug Trojan horse
, and several variants of the iServices Trojan horse
currently in the wild.
Some viruses and Trojan horse
programs will erase or corrupt files on your hard drive, and a recent backup might be the only way to recover your data.
China's Trojan Horses
provides detailed information--including maps, photos, and diagrams--on the operations and facilities of COSCO, OOCL, and other Red fronts at Long Beach, Los Angeles, Oakland, Seattle, Portland, New York-New Jersey, Charleston, Norfolk, Houston, Savannah, and New Orleans.
But currently, the big "industry" in Trojan Horses
seems to consist mainly of installing secret programs which steal user identification and passwords from America On Line (AOL) users.
America Online, the giant on-line computer service, has no connection with the Trojan horse
other than that its initials are used in the program's title.
Last week, Sophos experts of a malicious Chinese PowerPoint PPT file which contained exploit code that drops the keylogging Trojan horse
onto users' computers.
According to the Sophos experts, the Tofger Trojan horses
target users of a number of online banks, including Abbey, Barclays, Cahoot, HSBC, Lloyds, NatWest, Nationwide and Woolwich.
These threats combine the characteristics of viruses, worms, Trojan horses
and/or malicious code with server and Internet vulnerabilities to initiate, transmit and spread an attack.
Founded in 2002, Avinti works with existing antivirus and e-mail security solutions in a layered security approach that eliminates Trojan horses
, spyware, malware and other unknown e-mail threats from corporate e-mail systems.
It would be no surprise at all if more malware was written as the World Cup rapidly approaches," "Everyone should be careful not to fall foul of football-related viruses and Trojan horses
, as well as football-related spam and lottery scams.
Two of the most dangerous forms of spyware, system monitors and Trojan horses
, are appearing on enterprise networks at an alarming rate, according to the most recent Webroot Corporate SpyAudit, demonstrating the continued vulnerability of corporate systems to the escalating spyware threat.