/threat-encyclopedia

Threat Encyclopedia

1-15 of 39,772 results for all    
  • Trojanspy.Usteala

    Category: TrojanSpy

    Trojan-Spy programs can spy on how you're using your computer ' for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Turn ON popup blocker
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojandownloader.Mourea

    Category: TrojanDownloader

    Trojan-Downloaders downloads and installs malicious programs onto victim's computer.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Install software from genuine and trusted sources only.
    6. Turn ON pop-up blocker.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Ceeinjecthj

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Lukicsel

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Chekafev

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Vbinjectfp

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Worm.Renocidec

    Category: Worm

    A worm is a strain of malware that replicates itself over a network and then spreads to other machines through several channels. The worm sends a copy of itself to all the machines connected in the same network. This implies that if one machine in a network is infected, every machine can be infected subsequently.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Turn ON popup blocker.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • TrojanDownloader.Phrovon

    Category: TrojanDownloader

    Trojan-Downloaders downloads and installs malicious programs onto victim's computer.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Install software from genuine and trusted sources only.
    6. Turn ON pop-up blocker.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Backdoor.Shindo

    Category: Backdoor

    A backdoor is like a Trojan in the manner that it enters the system. But once inside, a backdoor opens a direct attack vector for further instructions from an attacker or for other viruses and worms. This is achieved through the establishment of a network connection between the infected machine and the attacker.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Add browser extensions from legitimate sources only.
    5. Check for the user reviews and ratings before adding any extension to your browser.
    6. Avoid websites that throw unnecessary or lots of advertisements.
    7. Turn ON pop-up blocker
    8. Install software only from genuine and trusted sources only.
    9. Make it a habit to read end-user license agreements and additional components installed by any software.
    10.Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    11. Avoid downloading and installing patched and cracked versions of any software.
    12. Keep backup of important data.
  • Trojandownloader.Zlobaw

    Category: TrojanDownloader

    Trojan-Downloaders downloads and installs malicious programs onto victim's computer.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Install software from genuine and trusted sources only.
    6. Turn ON pop-up blocker.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.SMSer

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Vbinjectba

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • TrojanDropper.Crenufs

    Category: TrojanDropper

    These programs are used by attackers in order to drop and install Trojan viruses.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Turn ON pop-up blocker.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojandownloader.Gendwndrop

    Category: TrojanDownloader

    Trojan-Downloaders downloads and installs malicious programs onto victim's computer.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Avoid websites that throw unnecessary or lots of advertisements.
    5. Install software from genuine and trusted sources only.
    6. Turn ON pop-up blocker.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.
  • Trojan.Vbinjectdo

    Category: Trojan

    A trojan is a malware disguised as a legitimate piece of software. This guise convinces a user to install the seemingly useful program and this is where the danger stems from. Once installed a trojan causes havoc in a system since it has been granted access willingly. This includes several malicious activities which could also include remote access gained by a threat actor.

    1. Keep Seqrite antivirus up to date.
    2. Perform regular scanning.
    3. Keep operating system & software's updated with latest updates.
    4. Disable unused ports. (For e.g. RDP)
    5. Avoid websites that throw unnecessary or lots of advertisements.
    6. Install software from genuine and trusted sources only.
    7. Do not click on links or download attachments received in unknown, unwanted or unexpected emails.
    8. Avoid downloading and installing patched and cracked versions of any software.
    9. Keep backup of important data.