Focused Malicious Activities
The Orient seems to be the focus of this weeks malicious activities.
View ArticleWeekly Review
More and more cyber criminals use JavaScript to hide and spread their evil creations. This week, with the exception of one
View ArticlePrivacy of China is endangered
Lately we have seen many e-threats exploiting Chinese software in order to spread or obtain sensitive data. This weeks review is focused on a couple of password stealing threats, part of which some are...
View ArticleClearing the way
Besides the usual Javascripts and rootkits that try to exploit vulnerabilities in applications or hide malicious program activities, this week we've encountered something rather strange.
View ArticleWeekly Review
It seems Mac users are not that safe anymore either. A, not so new but sill unique (for this operating system), e-threat is making the rounds these days trying to change vital settings in the way users...
View ArticleMalware Review – Have a promotion, have a
With the upcoming Christmas holidays, spam waves increase again announcing marvelous promotions from various respectable companies like Coca-Cola, McDonalds or Hallmark. Fall into the trap and get...
View ArticleWeekly Review – Wormania
Upon the arrival of Win32.Worm.Downadup, a new worm is spreading in the wild. Having far more abilities then Downadup, but no vulnerability exploitation code, the worm is not as spread as Downadup but...
View ArticleWeekly Review
This week we have several downloaders again, some of them however being part of online games password stealer families this time, to be more specific, the target is the MMORPG
View ArticleBitDefender weekly review
Do you play MapleStory, Age Of Conan, Rohan, The Lord OF The Rings, Knight Online or Lands Of Aden? If so, take great care, another e-threat is out there lurking to snatch you login credential to these...
View ArticleBitDefender weekly review
They don't like antivirus products. I don't know why, they're so friendly, they take care of our computers, protect our data and identity, but they still don't like antivirus products.
View ArticleBitDefender weekly review
This week we ended up analyzing a whole infection chain, from its source to the end result. The process starts with a maliciously crafter website and ends with a Backdoor installation. All without the...
View ArticleBitDefender weekly review
It is a known fact that some e-threats use instant messaging applications to spread. Did you ever wonder how it's done? Well this week, we have a worm that uses MSN Messenger. The amazing part about it...
View ArticleBitDefender weekly review
This week we stumbled across a new version of the Cutwail botnet (also known as Pandex or Pushdo). We've takes the liberty to analyze its main components and see what makes it tick, because it's the...
View ArticleBitDefender weekly review
Nothing fancy this week. We got a Visual Basic worm (again) running completely hidden under the Windows Scripting Host, a removable drives infecting Trojan and an IRC controlled Trojan written in...
View ArticleBitDefender weekly review
This week a pretty simple but recyclable IRCBot caught out attention. Besides the fact that it allows remote control of the infected machine by the attacker, the only noteworthy fact about it is that...
View ArticleBitDefender weekly review
The answer is simple: no. No matter how intuitive (and rather successful) it's spreading method is, this virus does no harm to any of the systems it comes in contact with, besides the actual file...
View ArticleBitDefender weekly review
Rather unusual activity has been analyzed this week. We have a worm that uses window titles to receive commands and a family which has not been seen spreading for a very long time: Trojan.Dialer
View ArticleWhat would you do to get back your Facebook
Same attack recipe, with slight changes: one day, FB fans are
View Article
More Pages to Explore .....