A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows:

* Email attachments
* Social engineering
* NetBIOS remote installation
* Physical access
* Fake executables
* Spyware and adware
* IRC and IM chats
* Flash applets
* ActiveX controls, VBScript, and Java scripts

Explore More

Winsock tutorial

Just a little something I have been writing on and off. It was originally meant to be a collaboration of two of my prior tutorials, however, I’m starting to find

More Trojan horse for Apple Mac! Is Mac more insecure than windows?

One more malware have been spotted for the Apple Mac machine. This time Trojan.iServices.B which gets into the system, open the backdoor in Mac machines and connect them to a

Critical SQL Injection in People Magazine

PlanetCreator has reported another critical SQL Injection (vulnerability) on  People Magazine Online Website http://www.people.com.mm Powered by Inforithm-Maze. SQL injection is a code injection technique that exploits a security vulnerability occurring