Quantcast
Channel: HOTforSecurity » file
Browsing latest articles
Browse All 20 View Live

Focused Malicious Activities

The Orient seems to be the focus of this weeks malicious activities.

View Article



Weekly Review

More and more cyber criminals use JavaScript to hide and spread their evil creations. This week, with the exception of one

View Article

Privacy of China is endangered

Lately we have seen many e-threats exploiting Chinese software in order to spread or obtain sensitive data. This weeks review is focused on a couple of password stealing threats, part of which some are...

View Article

Clearing the way

Besides the usual Javascripts and rootkits that try to exploit vulnerabilities in applications or hide malicious program activities, this week we've encountered something rather strange.

View Article

Weekly Review

It seems Mac users are not that safe anymore either. A, not so new but sill unique (for this operating system), e-threat is making the rounds these days trying to change vital settings in the way users...

View Article


Malware Review – Have a promotion, have a

With the upcoming Christmas holidays, spam waves increase again announcing marvelous promotions from various respectable companies like Coca-Cola, McDonalds or Hallmark. Fall into the trap and get...

View Article

Weekly Review – Wormania

Upon the arrival of Win32.Worm.Downadup, a new worm is spreading in the wild. Having far more abilities then Downadup, but no vulnerability exploitation code, the worm is not as spread as Downadup but...

View Article

Weekly Review

This week we have several downloaders again, some of them however being part of online games password stealer families this time, to be more specific, the target is the MMORPG

View Article


Safety Tips for Tax Preparation Online

Amidst the economic turmoil, 2009

View Article


BitDefender weekly review

Do you play MapleStory, Age Of Conan, Rohan, The Lord OF The Rings, Knight Online or Lands Of Aden? If so, take great care, another e-threat is out there lurking to snatch you login credential to these...

View Article

BitDefender weekly review

They don't like antivirus products. I don't know why, they're so friendly, they take care of our computers, protect our data and identity, but they still don't like antivirus products.

View Article

BitDefender weekly review

This week we ended up analyzing a whole infection chain, from its source to the end result. The process starts with a maliciously crafter website and ends with a Backdoor installation. All without the...

View Article

BitDefender weekly review

It is a known fact that some e-threats use instant messaging applications to spread. Did you ever wonder how it's done? Well this week, we have a worm that uses MSN Messenger. The amazing part about it...

View Article


The Spam Omelette #29

Welcome to the Spam Omelette, BitDefender

View Article

BitDefender weekly review

This week we stumbled across a new version of the Cutwail botnet (also known as Pandex or Pushdo). We've takes the liberty to analyze its main components and see what makes it tick, because it's the...

View Article


BitDefender weekly review

Nothing fancy this week. We got a Visual Basic worm (again) running completely hidden under the Windows Scripting Host, a removable drives infecting Trojan and an IRC controlled Trojan written in...

View Article

BitDefender weekly review

This week a pretty simple but recyclable IRCBot caught out attention. Besides the fact that it allows remote control of the infected machine by the attacker, the only noteworthy fact about it is that...

View Article


BitDefender weekly review

The answer is simple: no. No matter how intuitive (and rather successful) it's spreading method is, this virus does no harm to any of the systems it comes in contact with, besides the actual file...

View Article

BitDefender weekly review

Rather unusual activity has been analyzed this week. We have a worm that uses window titles to receive commands and a family which has not been seen spreading for a very long time: Trojan.Dialer

View Article

What would you do to get back your Facebook

Same attack recipe, with slight changes: one day, FB fans are

View Article
Browsing latest articles
Browse All 20 View Live




Latest Images