Skip to main content
6 entries found.
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 30, 2014

Microsoft security software detects and removes this family of threats.

These threats can give a malicious hacker access and control of your PC. They can download and run files, and steal your sensitive information.

Some variants specifically target the administration traffic of mobile base station controllers that are used by telecommunication providers. This stolen data could let a malicious hacker monitor and control the calls of an affected phone provider.

Find out ways that malware can get on your PC.  

Alert level: severe