enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Cerberus (Android) - Wikipedia

    en.wikipedia.org/wiki/Cerberus_(Android)

    Please introduce links to this page from ; try the Find link tool for suggestions. ( August 2024 ) Cerberus is a trojan horse targeting Android mobile phone banking credentials.

  3. Pegasus Project (investigation) - Wikipedia

    en.wikipedia.org/wiki/Pegasus_Project...

    It can be covertly installed on mobile phones (and other devices) running most [3] versions of iOS and Android. The spyware is named after the mythical winged horse Pegasus—it is a Trojan horse that can be sent "flying through the air" to infect phones. [4] Usages of the Pegasus spyware have been monitored for years.

  4. Pegasus (spyware) - Wikipedia

    en.wikipedia.org/wiki/Pegasus_(spyware)

    Its functionality is similar to the iOS version, but the mode of attack is different. The Android version tries to gain root access (similar to jailbreaking in iOS); if it fails, it asks the user for permissions that enable it to harvest at least some data. At the time Google said that only a few Android devices had been infected. [38]

  5. Mobile malware - Wikipedia

    en.wikipedia.org/wiki/Mobile_malware

    In August 2010, Kaspersky Lab reported the trojan Trojan-SMS.AndroidOS.FakePlayer.a. [7] This was the first SMS malware that affected Google's Android operating system, [8] and which sent SMS messages to premium rate numbers without the owner's knowledge, accumulating huge bills. [9]

  6. Ghost Push - Wikipedia

    en.wikipedia.org/wiki/Ghost_Push

    Ghost Push is a family of malware that infects the Android OS by automatically gaining root access, downloading malicious and unwanted software. [1] [2] The malware appears to have been discovered in September 2015 by the security research lab at Cheetah Mobile, who subsequently developed diagnostic software to determine whether a device has been compromised. [3]

  7. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    In computing, a Trojan horse (or simply Trojan) is a malware that misleads users of its true intent by disguising itself as a normal program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1] Trojans are generally spread by some form of social engineering.

  8. Xafecopy Trojan - Wikipedia

    en.wikipedia.org/wiki/Xafecopy_Trojan

    Xafecopy Trojan is a malware software targeting the Android operating system, first identified in September 2017 by cybersecurity and antivirus provider Kaspersky Lab. According to Kaspersky Lab, Xafecopy infected at least 4,800 users within a month in approximately 47 countries. [ 1 ]

  9. FluBot - Wikipedia

    en.wikipedia.org/wiki/FluBot

    FluBot is a sophisticated SMS computer virus –specifically a banking Trojan– of global reach which aims to steal private data from Android smart phones.Unlike much malware, FluBot has proven exceptionally durable, coming in waves or "campaigns" with each redesign.