A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows:

* Email attachments
* Social engineering
* NetBIOS remote installation
* Physical access
* Fake executables
* Spyware and adware
* IRC and IM chats
* Flash applets
* ActiveX controls, VBScript, and Java scripts

Explore More

LFI Scanner By GlaDiaT0R

#!/usr/bin/perl #LFI Scanner By GlaDiaT0R #My Mail: the_gl4di4t0r[AT]hotmail[DOT]com #Home Page: DarkGh0st.Com #Greetz To Boomrang_victim, Marwen_Neo & All Tunisian Hackers #www.darkgh0st.net #www.tunisian-power.net More Info http://www.planetcreator.net/planetcreator/perls.php?id=37

Critical Blind SQL Injection in MRTV4 (Myanmar)

PlanetCreator reported another Critical Blind SQL injection (vulnerability) on MRTV4 (Myanmar) URL : http://www.mrtv4.net.mm/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the database

MyanmarCyberSecurityTeam (MCST)

Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black