- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 1995
- Jan 1994
Is pornography actually taking a back seat online? Seems so... at least when it comes to spam. AOL reports that online medicine offers and phishing scams topped the 2004 spam list.
Troj/Agent-FO is a Trojan for the Windows platform.
W32/Leebad-B is a worm for the Windows platform that propagates through the available network shares with the filename system32.exe.
Troj/Bancban-AV is a Trojan for the Windows platform that steals confidential information such as online banking details and sends it to a preconfigured email address.
W32/RAHack is a virus that attempts to exploit Radmin software.
Flaw may leave Windows XP vulnerable to attack.
Troj/Chum-A is a backdoor Trojan that uses the IRC network to allow an attacker to access the infected computer.
Generic PWS.b is a detection for multiple nondescript password-stealing trojans - typically one-off creations that have been received by McAfee.
Code for virus that hits Symbian-based cell phones released.
Backdoor.Lifefournow is a backdoor Trojan horse program that allows a compromised computer to be used to reveal and test the configuration of a network.
Downloader-TO is a downloader Trojan that is itself downloaded, via an HTA file (named Microsoft Office.hta and is detected with the current DAT files as VBS/Psyme) that is believed to be used in conjunction with a recent Microsoft Internet Explorer HTML Help Control Local Zone Security Restriction Bypass Vulnerability exploit.
W32/Dedler-H is a worm for the Windows platform that attempts to spread using ICQ functionality.
The Perl/Spyski.worm detection covers a worm that is based on the idea of the Perl/Santy.worm virus.
W32.Protoride.B is a worm that spreads through network shares and opens a back door that allows unauthorized access to a compromised computer.
Symbos_Vlasco.A is Trojan malware that infects Series 60 mobile phones.
Spyki.A is a worm that affects servers running a version of the application phpBB prior to 2.0.11. phpBB is an open source program used to easily create bulletin boards, forums and newsgroups.
W32/Forbot-DH is an IRC backdoor and network worm for the Windows platform.
A banner year for virus writers meant a bad year for Internet users, but much of the damage was preventable.
HHelp is an exploit for a vulnerability in Internet Explorer v6.0 working on Windows XP computers, even with Service Pack 2 installed.
W32.Reper.A is a virus that copies itself to the disks on a computer between C: and Z: and adds itself to the autorun.inf file, so that it is started automatically when the disk is inserted.
Trojan.Phel.A is a Trojan horse program, which is distributed as an HTML file, and attempts to exploit the Microsoft Internet Explorer HTML Help Control Local Zone Security Restriction Bypass Vulnerability (BID 11467).
Perl.Lexac is a worm that spreads to Web servers running php scripts that are vulnerable to a 'File Inclusion Flaw,' which results from programming errors.
W97M.Dinela is a macro virus that attempts to infect the Microsoft Word Normal.dot template file and active documents.
Trend Micro is reporting Worm_Santy.F is rapidly spreading in the wild.
Troj/Bancos-AS is a password stealing Trojan for the Windows platform.
Trojan.Phel.A is a Trojan horse program that is distributed as an HTML file, and attempts to exploit the Microsoft Internet Explorer HTML Help Control Local Zone Security Restriction Bypass Vulnerability (BID 11467).
Pe_Stream.A is a new generation of Windows virus.
Bkdr_Surila.G is a memory-resident backdoor program downloaded into a system by Worm_Mydoom.S, a mass-mailing worm.
Troj_Loadimg.A is Trend Micro's detection for a proof-of-concept icon file that, if loaded, could cause a buffer overflow on the USER32 Library.
HLP_Exploit.A is Trend Micro's detection for the proof of concept .HLP files that, if loaded, would cause a buffer overflow on WINHLP32.EXE.
Perl.Santy.B is a worm written in Perl script that attempts to spread to Web servers running versions of the phpBB 2.x bulletin board software prior to 2.0.11.
Perl.Santy.C is a worm written in Perl script that attempts to spread to Web servers running versions of the phpBB 2.x bulletin board software prior to 2.0.11.
Troj/Agent-ZC is a Trojan for the Windows platform that can be used for sending unsolicited commercial email (spam) as a result of instructions downloaded from a preconfigured website.
Keylog-Jingt is a malicious keylogger Trojan that sends a package originating from China.
W32/Agobot-OR is a network worm with an IRC backdoor component.
Worm_Beaker.A arrives and propagates via email.
W32/Rembot-A connects to a predetermined IRC channel and runs in the background waiting for backdoor commands.
Phishers proved to be the biggest security threat this year. And analysts say the growth of online organized crime will make it even worse for 2005.
A holiday message from eSecurityPlanet...
W32/Rbot-SD is a network worm and IRC backdoor Trojan for the Windows platform.
W97M.Sapattra is a macro virus that infects Microsoft Word documents and the Normal.dot template.
Several security vendors continue to issue alerts for Perl/Santy-A, a worm that exploits a vulnerability in the phpBB bulletin board software.
W32.Randex.CCF is a network-aware worm that opens a backdoor on an infected computer and may be remotely controlled via IRC channels.
The Santy-A worm, which shows off the first automated Google hacking, has security analysts bracing for a whole new trend.
W32/Mkar-E is a virus that infects EXE files.
Server disposal can be a weak link in enterprise data security. Don't forget to scrub them... and then maybe take a hammer to them.
A new worm Santy has started spreading that infects only web servers, not end user computers.
W97M.Banedi is a macro virus that infects the Microsoft Word Normal.dot template and is triggered when a Word document is opened or closed.
Backdoor.Lateda is a backdoor Trojan horse program that allows an attacker to download and run files on the infected machine.
Troj/Bancban-AN is a data stealing Trojan that attempts to capture confidential information related to internet banking, such as usernames and logon passwords.
W32/Rbot-SB is a network worm and IRC backdoor Trojan for the Windows platform.
W32/Rbot-RY is a Windows network worm that spreads to weakly protected network shares and computers vulnerable to the RPC-DCOM exploit (see Microsoft Security Bulletin MS04-012).
W32/Oddbob-A is a network worm for the Windows platform.
W32.Pulkfer is virus that infects .exe files in the folder where it is executed from.
W32.Netdepix is a worm that attempts to exploit the Microsoft Windows LSASS Buffer Overrun Vulnerability (Microsoft Security Bulletin MS04-011).
W97M.Grurev is a simple Macro virus that infects Microsoft Word's Normal.dot template.
W32.PEQ@mm is a generic Visual Basic worm that spreads by sending a copy of itself to email addresses gathered from the Microsoft Outlook Address Book.
W32.Mugly.C@mm is a worm that uses its own SMTP engine to spread by sending itself as an email attachment to addresses gathered from the compromised computer.
W32.Looked is a worm that propagates through shared folders, downloads a file, and infects .exe files.
W32/Rbot-RW is a network worm and IRC backdoor Trojan for the Windows platform.
Trojan.Netdepix is a Trojan horse program that attempts to exploit the Microsoft Windows LSASS Buffer Overrun Vulnerability (Microsoft Security Bulletin MS04-011) on randomly selected computers.
Backdoor.Tabdim is a Trojan horse program that opens a backdoor and allows a remote attacker to control the infected computer.
W32/Sdbot-SI is a network worm and backdoor for the Windows platform.
W32/Wort-D is a network worm that attempts to spread to remote computers by exploiting the LSASS vulnerability (MS04-011).
Now that spyware has managed to draw the ire of corporate IT departments, we take a look at why it's still an uphill battle for both businesses and home users alike. At least for now...
Shares of McAfee sank Monday after Microsoft made its second move against the security company in a week.
Columnist Ray Everett-Church says very few think the CAN-Spam Act has been successful in stopping spam. But it has been successful in helping spammers fill your inboxes.
W32/Atak.j@MM is another variant of the Atak worm family.
W32.Envid.B@mm is a worm that sends email to all addresses found in the Microsoft Outlook Address Book.
W32/Forbot-DA is a worm that attempts to spread to remote network shares and computers vulnerable to common exploits.
W32/Forbot-EQ is an IRC backdoor Trojan and network worm for the Windows platform.
W32/Delf-JB is a virus for the Windows platform.
Analysts discuss Symantec's $13.5 billion proposal for Veritas, and rival EMC throws cold water on the deal.
W32/Forbot-BI is an IRC backdoor Trojan and network worm for the Windows platform.
W32/Rbot-RR is a worm that attempts to spread to remote network shares.
W32.Atak.F@mm is a mass-mailing worm that sends itself to addresses collected from the infected computer.
VBS.Sorpe.B@mm is a mass-mailing worm that sends itself to the email addresses gathered from the files on an infected computer.
VBS.Feadfe@mm is a mass-mailing worm that sends itself to email addresses it finds in the Microsoft Outlook Address Book.
W97M.Ginena is a macro virus that infects the Microsoft Word Normal.dot template and is triggered when a Word document is opened, closed, or saved.
The Zafi-D worm, which hit the Wild with great speed this past Monday, is infecting one out of every 10 emails traveling the Internet, according to anti-virus reports.
VBS.Sorpe.A@mm is a mass-mailing worm that sends itself to email addresses gathered from files on the infected computer.
UPDATED: The marriage of Symantec and Veritas would form one of the largest security and back-up software powers in the market.
Atak.H is a worm without destructive effects that spreads via e-mail in messages with variable characteristics that pass themselves off as Christmas greetings.
W32/Protoride-Z is a Windows worm that spreads via network shares.
W32/Forbot-CY is a network worm that attempts to spread via network shares.
W32/Agobot-DAA is an IRC backdoor and network worm.
W32.Erkez.D@mm is a mass-mailing worm that sends itself to email addresses gathered from the infected computer.
W32/Atak.i@MM is a worm that bears several characteristics.
Worm_Bagz.I is a memory-resident worm that arrives and propagates through email.
Worm_Rbot.AEF arrives as the file WIN23UPD.EXE on affected machines.
Trojan.Conycspa is a Trojan horse program that downloads and executes adware, dialers, and spamming Trojan horse programs from the Internet.
Backdoor.Ranky.N is a backdoor program that allows a compromised computer to be used as a covert proxy.
W32/Atak-G is a Windows worm that spreads via email.
W32.Qeds@mm is a mass-mailing worm that sends a copy of itself as an attachment to the email addresses that it gathers from the files on an infected computer.
Several vendors have issued alerts for Zafi.D, a worm that ends the active processes whose name contains the text strings firewall or virus.
The latest variant in the Zafi worm family has hit the Wild, disguising itself as a Christmas greeting. Discovered on Dec. 13, the worm already has earned 'medium threat alert' status.
W32/Sdbot-SG is a worm with backdoor Trojan functionality.
W32/Sdbot-SB is a member of the W32/Sdbot family of worms with a backdoor component.
W32/Atak-F is a Windows worm that spreads via email.
W32/Rbot-RN is a network worm that attempts to spread via network shares.
Netsky-P, first discovered March 22, has deftly used social engineering tricks to continually rank it as one of the most dangerous worms in the wild.
VBS.Junkmail@mm is a generic VBS mass-mailing worm that copies itself to files on the C drive of the infected computer.
Troj/Brabot-A is a backdoor Trojan that accepts commands via IRC.
W32.Janx is a worm that attempts to exploit the Microsoft Windows LSASS Buffer Overrun Vulnerability (Microsoft Security Bulletin MS04-011).
The search for the author of the fourth most wide-spread bug on the Internet has led authorities to Hungary.
JS.Speth.Worm is a Java Script file that copies itself throughout the C drive of the infected computer.
W32/Bagle.bf@MM is a virus that is simply a repackaging of W32/Bagle.aa@MM.
W32/Bagle.bg@MM is a new email worm that arrives by email in a password protected zip file.
W32/Agobot-NX is an IRC backdoor Trojan and network worm that is capable of spreading to computers on the local network protected by weak passwords.
W32/Bagle-AA is an email aware worm, and a member of the W32/Bagle family of worms.
This was a turbulent year of viruses, phishing attacks and bank-robbing Trojans. And it was a lot for IT and security managers to have to suffer through.
W32.Gaobot.BUU is a network-aware worm that has backdoor capabilities and can be controlled through IRC channels.
AdClicker-BP is an application type for 'potentially unwanted programs,' it is not a virus.
32/Anig-C is a worm that can spread by copying itself over network shares.
W32/Setclo-A is a network worm for the Windows platform.
Some security vendors have issued alerts for W32.Maslan.A@mm, a worm that uses mass-mailing, exploits, password-stealer, and rootkit techniques.
W32/Maslan-C is worm that spreads by emailing itself to addresses found on the infected computer.
W32/Rbot-RJ is a worm that attempts to spread to remote network shares.
Troj/Agent-BF is a downloading Trojan for the Windows platform that attempts to download and run a program from a remote location.
Troj/Banker-BG is a password stealing Trojan aimed at customers of Brazilian banks.
The open source community goes with the saying, ''Information wants to be free''. But does free necessarily mean safe? And how do you safely lock it down?
W32/Rbot-RF is a network worm and IRC backdoor Trojan for the Windows platform.
Some vendors have issued alerts for W32/Atak.e@MM, a new variant of the W32/Atak worm.
W32/Rbot-RC is an IRC backdoor Trojan and network worm.
W32/Rbot-RE is an IRC backdoor Trojan and network worm.
Trojan.Wlogo exploits the Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Vulnerability (described in the Microsoft Security Bulletin MS04-040) to download and execute a remote file.
Trojan.Frutca is a Trojan Horse program that hides files on the compromised computer and sends out information to remote server.
W32.Atak.B@mm is a mass-mailing worm that uses its own SMTP engine to send its messages to the email addresses it gathers from certain files on a compromised computer.
W32.Netsky.Z@mm!enc is an .enc detection for MIME-encoded files that contain the W32.Netsky.Z@mm worm.
W32/Atak.d@mm is a worm that bears certain characteristics.
W32/Rbot-QX is a network worm and IRC backdoor Trojan for the Windows platform.
Worm_Rbot.Add spreads via network shares.
W32/Anzae.worm.gen is a generic detection for the W32/Anzae.worm family of viruses.
W32/Agobot-OH is a worm with backdoor functionality that spreads to computers protected by weak passwords.
W32/Agobot-OL is a worm with backdoor functionality that spreads to computers protected by weak passwords.
W32.Aidid is a virus that overwrites all files in the A drive with a copy of itself.
QLowZones-4 is a detection that covers multiple Trojans, all of which have the same standard characteristics.
JS.Kidrash is a Java Script program that adds random garbage data to .html and .js files.
Sober-I is giving Netsky-P some competition when it comes to the title of Worst Virus on the Internet.
Microsoft brings seven new lawsuits against smut-peddling spammers under the CAN-SPAM law.
pcAudit is a spyware program, which is developed by a private company in order to test the security level in a computer.
W32/Wurmark-A is a Visual Basic mass-mailing worm.
W32/Agobot-NZ is a backdoor Trojan and worm that spreads to computers protected by weak passwords.
W32.Salga.A@mm is a mass-mailing worm that uses Microsoft Outlook to send itself to all the email addresses that it finds in the Outlook Address Book.
PWS-Banker.D is a detection for several password-stealing trojans - typically those targeted at E-Gold account holders.
Spyware has become the fourth-greatest threat to a company's security, propelling the anti-spyware market from $12 million last year to $305 million by 2008.
Following up on its enterprise offerings, HP puts new products out to fight viruses.
HTML_Iframebof.B is a malicious HTML file that exploits a known IFRAME vulnerability affecting Microsoft Internet Explorer and enables the execution of arbitrary codes on affected machines.
PWSteal.Tarno.K is a Trojan horse program that attempts to steal passwords and log information entered into Web forms.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?