dcsimg

Esecurityplanet.com Staff - Article Archives - Page 9

8/27: Packed.Generic.248 Detects Encrypted Files

August 27, 2009
Packed.Generic.248 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
READ MORE

8/26: Win32/Induc.A is a Windows Virus

August 26, 2009
Win32/Induc.A is a Windows virus.
READ MORE

8/25: Troj/Bckdr-QXN is a Windows Trojan

August 25, 2009
Troj/Bckdr-QXN is a Windows Trojan.
READ MORE

8/25: Packed.Generic.248 is Heuristic Detection

August 25, 2009
Packed.Generic.248 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software.
READ MORE

8/24: VBS.Runauto.G Spreads via Removable Drives

August 24, 2009
VBS.Runauto.G is a worm that spreads through removable drives and network shares. The worm also opens a back door on the compromised computer.
READ MORE

8/24: JS.Frienren Spreads via Social Networking Site

August 24, 2009
JS.Frienren is a worm that spreads through the Renren social networking Web site.
READ MORE

8/21: W32.Induc.A!dr Detects Infected Programs

August 21, 2009
W32.Induc.A!dr is a detection for programs that install Delphi-compiled applications infected with W32.Induc.A.
READ MORE

8/20: Mal/ObfJS-CG is Malicious JavaScript

August 20, 2009
Mal/ObfJS-CF is a malicious JavaScript embedded in a web page.
READ MORE

8/20: Adware.DoubleD Displays Out-of-Context Ads

August 20, 2009
Adware.DoubleD is an adware program that displays out-of-context advertisements.
READ MORE

8/19: W32.Induc.A!dcu Detects Malicious Delphi Library File

August 19, 2009
W32.Induc.A!dcu is a detection for a malicious Delphi library file that is created by W32.Induc.A.
READ MORE

8/18: RegDefense is Misleading App

August 18, 2009
RegDefense is a misleading application that may give exaggerated reports of errors on the computer.
READ MORE

8/17: Bloodhound.PDF.16 May Exploit Adobe Acrobat

August 17, 2009
Bloodhound.PDF.16 is a generic detection of potentially malicious PDF files, which may exploit a vulnerability in Adobe Acrobat in order to perform further malicious actions.
READ MORE

8/17: Bloodhound.Exploit.267 is Heuristic Detection

August 17, 2009
Bloodhound.Exploit.267 is a heuristic detection for files attempting to exploit the Microsoft Remote Desktop Connection ActiveX Control Heap Based Buffer Overflow Vulnerability (BID 35973).
READ MORE

8/14: Downloader.Sninfs is Trojan Horse

August 14, 2009
Downloader.Sninfs is a Trojan horse that may download files on to the compromised computer.
READ MORE

8/13: W32.Trats.B!inf Detects Files Infected by W32.Trats.B

August 13, 2009
W32.Trats.B!inf is a detection for files that are infected by the W32.Trats.B.
READ MORE

8/13: W32.Screentief Captures Screenshots

August 13, 2009
W32.Screentief is a worm that spreads by copying itself to removable drives. It also captures screenshots and attempts to send them to a remote attacker.
READ MORE

8/12: Hacktool.PStorRevealer Gathers Passwords

August 12, 2009
Hacktool.PStorRevealer is a hack tool that gathers passwords from stored in various applications.
READ MORE

8/10: W32.Feeb is File Infector

August 10, 2009
W32.Feeb is a file infector that may attempt to spread by copying itself to removable drives and shared folders.
READ MORE

8/10: W32.SillyFDC.BCS Copies Itself to Removable Drives

August 10, 2009
W32.SillyFDC.BCS is a worm that spreads by copying itself to removable drives.
READ MORE