Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

trojan tag

Drill down on trojan search:

11 result(s) displayed for trojan (1 - 11 of 11):

Your iPhone Could Get Hacked Through the Charger

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously...

Scam Users, Accumulate Facebook Likes, Buy a Ferrari

Bitdefender Labs recently reported that a site showing kittens and unicorns suggested users download a “business flash” plugin in order to see a video. At this point the plugin takes control of the user’s computer allowing cookie information to be...

Combofix is Great Antivirus Software

A malicious - fake antivirus messageIt's funny how ironic life can be as a few weeks back I posted an entry warning my readers about the various forms of malicious antivirus malware apps which try to install themselves on your...

Skype Problem with your Payment Scam

TMC has been getting inundated with emails lately about problems with Skype accounts we don't own. We checked into the malicious script embedded in the emails and they appear to send you to servers in Estonia where your computer is...

Malicious Software to Avoid Online

As a tech person I am often called upon to help people I know fix their computers when there is a problem. While my regular readers are no doubt aware of many of the Internet scams which infect computers with...

Cancelled Amazon Order Scam

 Example of frequent spam/malicious email we get frequently at TMC. Click on image to enlarge.For the last few weeks a number of my fellow team members here at TMC have been receiving confirmed and cancelled orders from most likely a...

Espionage via APT or Advanced Persistent Threat Widespread

Corporate and government secrets are currently being stolen on a grand scale - can anything be done about it? If you are one of those people not easily rattled, please have a seat and get ready to shake. A new...

FBI Director Almost a Phishing Victim

The fact that FBI Director Robert Muller almost fell victim to an online banking phishing scam which he said was started with an authentic looking email should be very scary news for all of us. After all, this isn't a...

iPhone Denial of Service Vulnerability

Radware today discovered the iPhone Safari browser is vulnerable to denial of service attack. The specific model being tested was the Apple iPhone1.1.4. In order to experience this problem a user must browse to a website containing malicious Javascript...

Hacking in the Air

Tony Rybczynski does a great job of alerting readers to the fact that Boeing originally had cockpit controls and in-flight internet for passengers on the same network in its new airplane the 787. Could you imagine the problems of...

SpamThru: P2P Anti-Virus Trojan

A state of the art p2p Trojan horse called SpamThru includes its own anti-virus software to ensure it isn’t competing with other viruses or Trojan horses. We are seeing viruses enter the age the of the ultimate selfishness where they...
Featured Events