<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; trojan</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/trojan/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Twitter users may be victims of direct message malware</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/09/25/twitter-users-may-be-victims-of-direct-message-malware/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/09/25/twitter-users-may-be-victims-of-direct-message-malware/#comments</comments>
		<pubDate>Tue, 25 Sep 2012 12:52:09 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1427</guid>
		<description><![CDATA[I&#8217;m not the only one to be getting these spammy direct messages on Twitter that lead to bogus Facebook links. Apparently a lot of people have been complaining of these messages, according to Sophos analyst Graham Cluley who wrote about it on the Naked Security blog. Different variations of the direct messages include, &#8220;your in <a href='http://internal3m.com/CMS/Wordpress/2012/09/25/twitter-users-may-be-victims-of-direct-message-malware/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>I&#8217;m not the only one to be getting these spammy direct messages on Twitter that lead to bogus Facebook links. Apparently a lot of people have been complaining of these messages, according to Sophos analyst Graham Cluley who wrote about it on the Naked Security blog.</p>
<p>Different variations of the direct messages include, &#8220;your in this [link] lol&#8221; and &#8220;lol ur famous now [link]&#8221; (I got this one too).</p>
<p>Of course, I didn&#8217;t click on the link. However, according to Cluley, those people that do click are led to a video player that says, &#8220;An update to Youtube player is needed.&#8221; Users are asked to download what is supposedly called &#8220;FlashPlayerV10.1.57.108.exe,&#8221; but Sophos antivirus products detect it as Troj/Mdrop-EML, which is a backdoor Trojan that can copy itself to accessible drives and network shares.</p>
<p>A Slate reporter wrote that he clicked on the bogus link and was directed to Facebook where he was told he had to log in to access an app. It&#8217;s unclear if this link also contained some sort of virus, Trojan, or malware.</p>
<p><strong>MORE</strong>: <a href="http://news.cnet.com/8301-1009_3-57519494-83/twitter-users-may-be-victims-of-direct-message-malware/" target="_blank">Twitter users may be victims of direct message malware | Security &amp; Privacy &#8211; CNET News</a>.</p>
<p>&nbsp;<br />
<hr/>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/09/25/twitter-users-may-be-victims-of-direct-message-malware/feed/</wfw:commentRss>
		<slash:comments>287</slash:comments>
		</item>
		<item>
		<title>Find Out if Your Mac Has the Flashback Trojan &#8212; the Fast and Easy Way</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/#comments</comments>
		<pubDate>Fri, 06 Apr 2012 18:24:12 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[interface]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[flashback]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=849</guid>
		<description><![CDATA[According to a report Thursday, more than 600,000 Macs could be infected with the nasty Flashback trojan. We’ve already detailed how to check your Mac to see if you’re infected — but that requires some command line code, and we know that not all users are comfortable doing that. Now we’ve gone one step further <a href='http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://mashable.com/2012/04/05/mac-flashback-trojan-check/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Mashable+%28Mashable%29"><img src='http://internal3m.com/CMS/Wordpress/wp-content/uploads/2012/04/white-macbook-sad-600-275x171.jpg' alt='' /></a></p>
<p>According to a report Thursday, more than 600,000 Macs could be infected with the nasty Flashback trojan.</p>
<p>We’ve already detailed how to check your Mac to see if you’re infected — but that requires some command line code, and we know that not all users are comfortable doing that.</p>
<p>Now we’ve gone one step further and wrapped those commands into two AppleScripts.</p>
<p><strong>READ MORE:</strong></p>
<p>via <a href="http://mashable.com/2012/04/05/mac-flashback-trojan-check/">Find Out if Your Mac Has the Flashback Trojan &#8212; the Fast and Easy Way</a>.</p>
<p>&nbsp;<br />
<hr/>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/04/06/find-out-if-your-mac-has-the-flashback-trojan-the-fast-and-easy-way/feed/</wfw:commentRss>
		<slash:comments>231</slash:comments>
		</item>
		<item>
		<title>Mac trojan poses as PDF to open botnet backdoor</title>
		<link>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/#comments</comments>
		<pubDate>Fri, 23 Sep 2011 18:20:04 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Agency News]]></category>
		<category><![CDATA[back door]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[pdf]]></category>
		<category><![CDATA[trojan]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=544</guid>
		<description><![CDATA[Malware continues to be a minimal threat to most Mac users, but that doesn&#8217;t mean attackers aren&#8217;t constantly trying to come up with new ways to steal information or turn users&#8217; machines into botnet drones. The latter appears to be the case with a new Mac trojan posing as a PDF file, discovered by security <a href='http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>Malware continues to be a minimal threat to most Mac users, but that doesn&#8217;t mean attackers aren&#8217;t constantly trying to come up with new ways to steal information or turn users&#8217; machines into botnet drones. The latter appears to be the case with a new Mac trojan posing as a PDF file, discovered by security researchers at F-Secure.</p>
<p>via <a href="http://arstechnica.com/apple/news/2011/09/mac-trojan-poses-as-pdf-to-open-botnet-backdoor.ars">Mac trojan poses as PDF to open botnet backdoor</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2011/09/23/mac-trojan-poses-as-pdf-to-open-botnet-backdoor/feed/</wfw:commentRss>
		<slash:comments>83</slash:comments>
		</item>
	</channel>
</rss>
