A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows:

* Email attachments
* Social engineering
* NetBIOS remote installation
* Physical access
* Fake executables
* Spyware and adware
* IRC and IM chats
* Flash applets
* ActiveX controls, VBScript, and Java scripts

Explore More

What Damage Can Hackers Do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in

MyanmarCyberSecurityTeam (MCST)

Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black

Joomla Hack

######################################################################################### Joomla 1.5.x Remote Admin Password Change ########################################################################################## ## Author: d3m0n ([email protected]) ## Greets: GregStar, gorion, d3d!k ## ## Polish “hackers” used this bug to deface turkish sites BUAHAHHA nice