Tue, 05/12/2009 - 14:34 — Igor Donchenko
Search engines search
Popular search terms are strongly influenced by the hot topics talked about by the general public. During the latest weeks one would presume that search topics like "swine flu" and "H1N1" are among those most searched after. It seems like a safe bet to guess that neither of these were among the top million search topics half a year ago.
Sun, 05/10/2009 - 13:13 — Igor Donchenko
PandaLabs, Panda Security’ malware detection and analysis laboratory, has observed how cyber-criminals are starting to use their own search engines to lead users to malicious pages, often created for distributing malware. This new trend underlines how cyber-crime is becoming increasingly professional.
Fri, 05/08/2009 - 09:11 — Igor Donchenko
BitDefender today released the ten most prevelant threats facing Internet users in the month of April. The top is still dominated by Trojans, as it was in March. These threats rely solely on tricking users to spread the e-threat, and they occupy seven of the ten positions this month.
Only a couple of worms, exploits and viruses break up the "trojan parade."
Thu, 05/07/2009 - 09:01 — Igor Donchenko
The social network Twitter has become extremely popular in quite a short time, with several million members. In brief Twitter is a community where the members are able to post information (about whatever) of up to 140 characters. Members of this community are able to follow other members' postings, and may thus be updated about friends' and others' activities and interests.
One should however, as always be cautious and observe common sense.
Wed, 05/06/2009 - 10:49 — Igor Donchenko
Top 10 exploitation attempts detected for this period, ranked by vulnerability traffic. Percentage indicates the portion of activity the vulnerability accounted for out of all attacks reported in this edition. Severity indicates the general risk factor involved with the exploitation of the vulnerability, rated from low to critical. Critical issues are outlined in bold:
Tue, 05/05/2009 - 09:53 — Igor Donchenko
Two Top Twenties have been compiled from data generated by the Kaspersky Security Network (KSN) throughout April 2009.
The first Top Twenty is based on data collected by Kaspersky Lab’s version 2009 antivirus product. The ranking is made up of the malicious programs, adware and potentially unwanted programs most frequently detected on users’ computers.
Mon, 05/04/2009 - 08:59 — Igor Donchenko
May 2009 virus activity review from Doctor Web
Doctor Web presents the virus activity review for May 2009. In the past month the share of ransomware among other malicious programs remained the same but virus makers honed their social engineering techniques and created new tools that would make their work easier. May also saw several new rootkits. Spammers were even more eager to advertise their services using new ways to bypass spam-filters.
Thu, 04/30/2009 - 21:15 — Igor Donchenko
Trend Micro discovered a new file sourced by a known Conficker P2P IP node - a new variant of Conficker now known as WORM_DOWNAD.E, indicating that cybercriminals behind the notorious Conficker worm may finally be gearing up for more serious attacks.
Trend Micro threat researchers had been carefully monitoring for signs of Conficker activity and discovered increasing P2P communications from the Conficker peer nodes, believed to be hosted in Korea. The file, found in the Windows Temp folder, was created on April 7, 2009 at 07:41:21 PM, PDT.
Wed, 04/29/2009 - 20:26 — Igor Donchenko
Malware exploits moved at unprecedented speed and volume this past year but 2009 may bring increasing cooperation among security vendors and law enforcement agencies to bring down criminal enterprises, according to the annual Trend Micro Threat Roundup & 2009 Forecast.
Tue, 04/28/2009 - 21:16 — Igor Donchenko
Less than seven percent of emails that reached companies in the first quarter of 2009 were legitimate correspondence. Some 90.92% of messages were spam, while 1.66% were infected with some type of malware.