Thu, 04/16/2009 - 20:43 — Igor Donchenko
PandaLabs, Panda Security’s malware detection and analysis laboratory, has detected a black hat SEO attack (Search Engine Optimization) using the name of the Ford car manufacturer as bait to distribute malware on the Internet. Specifically, PandaLabs has discovered 1.2 malicious results in searches related to the Ford Motor Co. which point to these malicious pages. The malware is distributed as follows: When users searching for information about Ford click one of the malicious results, they are taken to a Web page in which it seems as if they are about to see a video.
Wed, 04/15/2009 - 15:16 — Igor Donchenko
PandaLabs, Panda Security’s malware detection and analysis laboratory, has detected a new malicious code, Banker.LSL, which uses the proximity of the Easter holidays to trick users with a YouTube religious video in Portuguese
Wed, 04/15/2009 - 14:02 — Igor Donchenko
PandaLabs, Panda Security’s malware detection and analysis laboratory, has presented its malware report for the first quarter of 2009. According to the report, Trojans have accounted for 73% of all new malware created during this period. Nevertheless, one of the main trends identified in the report is the growth of spyware, which rose from 2.5% in the previous quarter to 13.15% in the first three months of the year.
Fri, 04/10/2009 - 09:28 — Igor Donchenko
Doctor Web informs Internet community about an epidemic of several modifications of Trojan.Blackmailer that has started at the end of March 2009. Starting on March 31 virus analysts of Doctor Web have been registering increased number of detections of Trojan.Blackmailer The figures suggest that the number of infected machines may reach several millions. Definitions of new modifications of Trojan.Blackmailer were promptly added into the Dr.Web virus database as they appeared sincethe epidemic started. Now users of Dr.Web anti-viruses are protected from all variations of the Trojan.
Thu, 04/09/2009 - 15:50 — Igor Donchenko
Top 10 exploitation attempts detected for this period, ranked by vulnerability traffic. Percentage indicates the portion of activity the vulnerability accounted for out of all attacks reported in this edition.
Thu, 04/09/2009 - 15:42 — Igor Donchenko
Two Top Twenties have been compiled from data generated by the Kaspersky Security Network (KSN) throughout March 2009.
The first Top Twenty is based on data collected by Kaspersky Lab’s version 2009 antivirus product. The ranking is made up of the malicious programs, adware and potentially unwanted programs most frequently detected on users’ computers.
Thu, 04/09/2009 - 15:11 — Igor Donchenko
Doctor Web presents a review of activities of malicious programs in March 2009.
Tue, 03/10/2009 - 14:41 — Igor Donchenko
Drive-by-download components dominate February’s list of Top Ten E-Threats, according to BitDefender®. These drive-by-download components are atomic bits of malware strung together like a "daisy-chain" by malware creators. Each "atom" represents another attempt by cybercriminals to compromise the security of a user’s system.
Tue, 03/10/2009 - 14:10 — Igor Donchenko
A large number of malicious programs are spread in order to increase the number of zombie computers in botnets. Tdss and Virut are common examples of rapidly growing zombie networks.
Fri, 02/20/2009 - 23:46 — Igor Donchenko
Sality.AO is a virus that combines the features of traditional viruses (infecting files and damaging as many computers as possible to achieve notoriety for creators) with the objectives of new malware, i.e. generating financial returns for cyber-criminals. PandaLabs, Panda Security’s malware detection and analysis laboratory, has noted an increase in the number of infections caused by this malware over recent days, as well as new variants using the same techniques. It is therefore advising users to be on their guard against a possible massive attack.