- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- Mar 2006
- Oct 2005
- Sep 2005
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
A worm reported Monday runs an attached file when an email message is viewed on unpatched Microsoft email clients.
Symantec on Friday issued alerts for a Trojan horse and a worm that both give hackers remote access to a computer.
For the second day in a row, antivirus software vendor Panda Software was issuing an alert Thursday for a new Trojan called Rolark.
Two viruses that target flaws in Windows 2000 were reported Wednesday by antivirus vendors.
An Internet worm reported Tuesday attempts to spread by emailing itself via SMTP and using the ICQ and KaZaA networks.
Several antivirus software vendors were issuing alerts on Monday for a new strain of the LovGate virus.
A worm reported Friday by antivirus software vendor Symantec displays a fake 'Popeye' error message.
A Trojan horse reported Thursday inserts a file in the Microsoft Outlook Express signature, sending a code that tries to access a specific Web site when the message is opened.
Antivirus software vendor McAfee issued a low-level notice Wednesday for W32/Ganda@mm, a mass-mailing worm that kills certain processes running on the victim machine.
A worm using Microsoft Outlook's Messaging Application Programming Interface sends out an anti-war email message with itself as an attachment to addresses listed in the user's Outlook address book.
A mass-mailing worm that contains its own SMTP engine and sends email to contacts from a machine's Windows address book alludes to Iraq spy pictures in the subject line.
A worm and backdoor Trojan that spreads via file sharing on KaZaA networks and email tries to trick users with a bogus eCard message, according to antivirus software vendor Sophos.
A worm distributed via email initially appears to merely activate a game for users. But security vendor Sophos says it does more than that.
Web security gateway vendor NetContinuum has upgraded its NC-1000 appliance to enable deeper inspection of Domain Name System traffic that traditional firewalls are unable to secure.
Several antivirus software vendors on Wednesday were reporting multiple incidents of the CodeRed.F worm from Japan and Italy.
The NiceHello e-mail worm was still being reported Tuesday by various antivirus software vendors. NiceHello reaches computers in an e-mail with variable characteristics, notably the use of Spanish phrases in the subject field, message text and attachments.
Several antivirus software vendors were issuing alerts Monday for the Deloder worm (W32/Deloder.A), which originated in China and infects computers running under Windows 2000 and XP.
A mass-mailing worm that uses Microsoft Outlook to send itself to all contacts in the Outlook address book opens a program that looks like a shooting game.
A multifaceted Word macro virus with an encrypted replication routine carries several possible payloads designed to delete or rename a variety of files.
A polymorphic Visual Basic Script worm reported Thursday by antivirus vendor Symantec attempts to spread through KaZaA Lite.
A variant of the Backdoor.SubSeven Trojan horse allows a hacker to access and gain control of a computer, though Symantec gives it an overall low risk assessment.
Antivirus software vendor Trend Micro is giving a low risk rating to a memory-resident worm designed to propagate copies of itself via email, KaZaA, and other popular peer-to-peer file-sharing networks.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?