- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 1995
- Jan 1994
ASP/Backdoor-gen is a generic detection for script files (usually VB) that are used to control a web server running asp extensions.
In this final part of the series, we examine the security technologies companies employ to protect their networks. That is, when they even bother...
PE_Trats.A-O is a file infector that may be dropped by other malware.
W32/VB-DYF is a worm for the Windows platform.
Troj/Agent-GKH is a downloader Trojan for the Windows platform.
A new variant of the Puper Trojan is attempting to spread on the premise that it offers a codec to see a video of the suicide attack that killed Pakistani Prime Minister Benazir Bhutto.
QHosts-96 is a Trojan that modifies the local HOSTS file.
W32/VB.Hc is a worm that infects Windows systems.
W32/Kibik.b is a parasitic virus that will install a backdoor proxy.
Exploit-PPT.i is a Trojan detection that covers specially crafted files attempting to exploit vulnerabilities in Microsoft PowerPoint to drop malware files.
DNSChanger.h is a Trojan that changes the DNS server address to point to its preferred DNS, upon installation.
DNSChanger.f.dr is a Trojan whose main objective is to change the default DNS entries to its own preferred DNS server.
A new variant of VBS/Psyme Trojan is part of a threat attempting to spread on the premise that it offers a codec to see a video of the suicide attack that killed Pakistani Prime Minister Benazir Bhutto.
MsnChirstmas.A is a worm that sends messages with the worm to all our contacts of MSN Messenger.
Who will break more ground in the coming year: multi-billion dollar hardware companies or Russian malware gangs?
W32.Ranetif is a worm that opens a back door and infects files.
Yahmail.A is a Trojan steals user passwords of the Instant Messaging Program "Yahoo Messenger" from the infected computer.
W32/Onlinegames.Lov.PSW is a Windows systems Trojan.
W32/VirtInf-A is a virus for the Windows platform.
Troj/Dload-AF is a downloader Trojan for the Windows platform.
Troj/Dload-AE is a multi-component downloader Trojan for the Windows platform.
BackDoor-CKB.sys Trojan is the rootkit component of BackDoor-CKB.
W32/Checkout!Oe4a3c52 is a variant of the W32/Checkout worm, which was found spreading through MSN Messenger during Christmas day.
Worm_Zhelati.AIS arrives as attachment to email messages spammed by another malware or a malicious user.
Worm_Mydoom.BD drops several files upon execution.
Trojan.Virantix.B is a Trojan horse that ends antivirus applications and displays a fake security alert.
W32.Mubla.Gen is a generic detection for variants of the W32.Mubla family of worms.
W32.Lurkasys.A is a virus that infects executable files.
Troj/BBDoS-A is a Trojan for Unix platforms.
W32/Casail is a worm that will infect Windows systems and spreads through removable drives and local drives.
W32.Vapka.A is a worm that spreads by copying itself to removable media and steals confidential information.
W32/Autorun.worm.i.gen is a worm that attempts to spread to removable drives by creating an autorun.inf file, which will run the worm automatically, if a system that uses the removable drive is set to Autorun.
Trojan.Bankpatch.B is a Trojan horse that blocks Internet access to certain security-related Web sites.
Certain email snafus can be fatal to the effectiveness of a company's entire email strategy and can tarnish the goodwill associated with their good name.
Troj/MutRK-A is a rootkit Trojan for the Windows platform.
Troj_Qhost.GC is a Trojan that can be downloaded unknowingly by a user when visiting malicious Web sites.
Evata.A is a worm that carries out plenty of modifications in the Windows Registry, which prevents the user from working with the computer as usual.
W32/Agent.CTF is Windows systems Trojan.
Troj/Agent-GJR is a Trojan for the Windows platform.
BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider.
QHosts-95 Trojan modifies the Windows hosts file to redirect accesses to Google Adsense to a malicious remote site.
W32.Casail.A is a worm that spreads through removable drives.
Trojan.Qhosts.F is a Trojan horse that modifies the hosts file on the compromised computer.
Expl_Realplay.H is an exploit that is hosted on a Web site and runs when a user accesses the said Web site.
W32/VB.KK.Dropper is a Windows Trojan.
Mozilla tries to make up for lost time with new release packing in security and functionality enhancements.
W32/KutWormor is a virus that will add the user on a community called "Infectados pelo Virus Orkut," which means "Infected by the Orkut Virus" and start to send scraps (messages on orkut model) to the friends of the infected user.
JS.Woorkut is a worm that spreads through the Orkut online community.
W32/SillyFDC-BQ is a spyware worm for the Windows platform.
Troj/Agent-GJL is a Trojan for the Windows platform.
Troj/Drop-D is a Trojan for the Windows platform.
W32/Onlinegames.Isb.PSW is a Trojan that will infect Windows systems.
Security vendor Cenzic claims its found vulnerabilities that both Microsoft and Google aren't taking seriously.
Nahkos.A is a worm that prevents the user from carrying out certain actions.
W32/Onlinegames.Isb.PSW is a Trojan that will infect Windows systems.
Troj_Tarodrop.AB is a Trojan document file used by Ichitaro, a popular word processing application in Japan produced by JustSystem.
Troj/Dloadr-BGR is a Trojan for the Windows platform.
Exploit-TaroDrop.d Trojan detects files attempting to exploit a 0-day vulnerability in JustSystem Ichitaro discovered in December 2007.
W32/Etap is a highly complicated cross-platform metamorphic virus, which infects both Windows PE executables and Linux/UNIX ELF format executables.
W32/YMWorm-A is an instant messenger worm for the Windows platform.
Troj/BankDL-DC is a Trojan for the Windows platform.
W32/Rbot-GVO is a worm and backdoor Trojan for the Windows platform.
Trojan.Silentbanker is a Trojan horse that records keystrokes, captures screen images and steals confidential financial information to send to the remote attacker.
Troj/Proxy-IB is a proxy server Trojan for the Windows platform.
Troj/IRCBot-ZM is a Trojan for the Windows platform.
So says a company that sells a rootkit detection and removal product. But at least one analyst concurs that rootkit removal needs work.
W32/Looked-EB is a virus and network worm for the Windows platform.
Troj_Asprox.A is a Trojan that opens TCP port 80 and acts as a proxy server to allow a remote malicious user to use the affected system in concealing the said author's identity when performing malicious activities.
W32/Divvi.a virus is a parasitic file infector, which appends its code to EXE files.
Trojan.Tarodrop.F is a Trojan horse that attempts to exploit an unspecified vulnerability in the JustSystem Ichitaro application.
W32/Atax-A is a worm for the Windows platform.
W32/Voterai.worm.f is a destructive worm designed to perform a dubious political campaign for Kenya elections.
Troj/Tanto-G is a Trojan for the Windows platform.
AdClicker-FI is a detection is for the .EXE file dropped by the AdClicker-FI.dr Trojan.
AdClicker-FI.dr is a Trojan that comes as a self-extracting (SFX) RAR file.
W32/Autorun.worm.bd is a worm that propagates by making copies of itself over removable media and network drives.
W32/Mypis-Fam is a family of infected executable files that has been patched to download and execute malware from a remote location.
W32/Blehs-A is a worm for the Windows platform.
W32.Mubla.C@mm is a mass-mailing worm that spreads through email and MSN Messenger.
PWS-LDPinch.cfg is the server configurator component of the PWS-LDPinch Trojan.
Troj/Revkey-A is a hacked copy of the commercial "Actual Spy" keylogger.
At least two security vendors hae issued alerts for Troj/KillAV-ED, a Trojan for the Windows platform.
W32.Kangero.A is a worm that copies itself to mapped drives.
Troj/Cargar-A is a Trojan for the Windows platform.
Troj/Psyme-GB is a Trojan for the Windows platform.
Trojan.Palusad is a Trojan horse that bypasses alerts triggered by Registry Monitor, a security software used in China.
W32/Mabezat is a worm that is capable of spreading through removable devices and network shares.
W32/SillyP2P-A is a worm for the Windows platform.
Troj/StartP-W is a Trojan for the Windows platform.
Troj/PPntDrop-A is Trojan for the Windows platform.
W32/Vundo.ZE is a Trojan that infects Windows systems.
Worried that application vulnerability testing will bust your production environment? Don't be... "real."
Thieves stole 14 years of visitors' personal data in a sophisticated targeted attack.
Downloader-BDH is a downloader Trojan, which when executed, could further download more malicious components from the web and install them on the victims machine.
Downloader-BEZ is a downloader Trojan, which when executed, could further download more malicious components from the web and install them on the victims machine.
W32.Trats is a virus that infects executable files on the compromised computer.
Troj/Agent-GIL is a Trojan for the Windows platform.
W32/Autorun-X is a worm for the Windows platform.
W32.Baki.D is a worm that spreads by copying itself to local and removable drives.
W32.Rarbeauty@mm is a mass-mailing worm that spreads by attaching itself to emails sent to all Microsoft Outlook contacts.
W32.Chod.S is a worm that spreads through Microsoft instant messaging clients.
HTML_Iframe.HT is the detection of Trend Micro for malicious HTML scripts that contain malicious IFRAME tags.
Spy-Agent.cf is a Trojan that attempts to steal information from a user's system.
W32/Heiku worm will modify Internet Explorer's start page and change the window title.
W32/Sdbot-DJE is a network worm and IRC backdoor for the Windows platform.
DDoS-Rincux is a Trojan that performs certain actions.
W32/Sohana-AP is a worm for the Windows platform.
W32.Trats is a virus that infects executable files in the Startup folder and listed in the registry under the Run subkey.
W32.Folmess is a worm that spreads by copying itself to all folders on the compromised computer.
W32.Babelloh is a worm that copies itself to shared folders and removable drives.
Troj/Dropper-SR is a dropper Trojan for the Windows platform.
Vora.A is a worm whose main aim is to spread and affect as many computers as possible.
W32.Debsis.A is a worm that spreads by copying itself to network shares and removable drives.
Troj/Bckdr-QKK is a Trojan for the Windows platform.
DDos-Rincux is a Trojan that upon execution performs certain actions.
W32.Niuniu.B is a worm that spreads through removable drives.
Troj_Dloader.XAP is a Trojan that may be dropped by other malware.
HTML_Iframe.EN is Trend Micro's detection for URLs that contain hidden iFrame links that lead to the download of TROJ_AGENT.BRB.
Troj_Delf.NWZ is a Trojan that arrives as an attachment to mass-mailed emails with a fake message from the U.S. Department of Justice.
W32.Dronzho is a worm that spreads through removable storage devices.
Troj/Wiepaz-A is a Trojan for the Windows platform.
LiveDeath.A is a Trojan that disables the mouse and deletes all the files from the C: drive that are not being run at that moment.
Troj_Vundo.ZE is a Trojan that may be dropped by other malware.
W32/Drowor is a worm that will infect Windows systems.
The security software provider will offer a smorgasbord of antivirus and identity-protection applications to all high-speed Internet customers in 2008.
Google hackers, however, need not worry; at least that's what Johnny 'I hack stuff' Long thinks.
Troj/Agent-GHN is a Trojan for the Windows platform.
UPDATED: No patch yet from Apple as the government issues a Technical Cyber Security Alert.
W32/Mabezat-B is a virus for the Windows platform that also spreads by copying itself to network shares and removable devices.
W32/Autorun-T is a spyware worm for the Windows platform.
Troj/DrProt-Gen is a Trojan for the Windows platform.
Puper.dr is a Trojan designed to download the Puper Trojan from a remote site.
New data loss prevention software from Trend Micro knows when you've been naughty and tells you so.
W32/Smit-A is a worm for the Windows platform.
Mal/Accesso-A is a Trojan dialer for the Windows platform.
Generic VB.b Trojan has variants that will create copies of themselves with the same name of folders of the location it was executed.
Troj/Agent-GHM is a Trojan for the Windows platform.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?