Malware

  • This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This Android malware is able to evade Google’s Bouncer.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware disguises itself as an app named Find and Call. It is a malicious app that uploads a user's phone book to a remote server and sends spammed SMS to the user's contact list.
    Read more

  • This malware disguises itself as an app named Find and Call.To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat Diagram shown below.
    Read more

  • This malware is noteworthy due to its involvement in targeted attacks against organizations. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more

  • This ransomware disguises itself as notices from the Federal Bureau of Investigation (FBI) and The Police Central e-crime Unit (PCeU) of the Metropolitan Police Service in order to convince affected users to pay the fine.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is one of the "Printer Virus" that prints several lines of characters when executed on infected systems. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
    Read more

  • This malware steals designs and drawings from affected users. It also steals the .
    Read more

  • This malware steals designs and drawings from affected users. It also steals the .
    Read more

  • This malware steals designs and drawings from affected users. It also steals the .
    Read more

 

connect with us on

facebook youtube linkedin feed