Quantcast
Channel: HOTforSecurity
Browsing latest articles
Browse All 89 View Live

BitDefender weekly review

Trojan.Spy.ZBot.VG The malware spreads by sending itself as attachments in spam messages. This particular version of Zbot is, again, a repacked version of Trojan.Spy.ZBot.UI, which injects code in...

View Article



BitDefender weekly review

Win32.Sality.PB When executed, the malware first ensures it will be launched on every system startup by changing several registry keys. If will include itself in the windows firewall to seem more...

View Article

BitDefender weekly review

Trojan.PWS.OnlineGames.KCPG Upon execution the Trojan will make a copy of itself in %temp% as uret463.exe. Then it will drop lhgiyi[x]dll in the same folder (where [x] is any number) and inject it in...

View Article

BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article

Image may be NSFW.
Clik here to view.

BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article


BitDefender weekly review

Backdoor.IRCBot.ACTN This worm is packed and encrypted in order to avoid av detection and hide its malicious purpose. When first run, it creates a hidden copy of itself in %windir%, under the name...

View Article

Image may be NSFW.
Clik here to view.

BitDefender weekly review

Win32.Induc.A The virus spreads by infecting Delphi development environments (versions 4 through 7). When an infected executable is run, the virus checks the registry for specific Delphi entries and if...

View Article

BitDefender weekly review

Win32.Worm.Autorun.TF When the worm is executed, it will make certain changes to the registry to ensure it will be run on every system startup on the infected machine. Next it will create the hidden...

View Article


BitDefender weekly review

The website contains information about the romanian celebrity “Elena Udrea”, hence the name of the backdoor: Udrea – Ardu (udrea in reverse without the e). A comment string inside the backdoors’ code...

View Article


BitDefender's approach to cloud technology

In the Cloud Technology (ITC) is the kind of technology that “takes care of itself”. The end user doesn’t have to worry about upgrading, upscaling or hardware support. Everything is taken care of by...

View Article

BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article

BitDefender weekly review

Trojan.Dropper.Microjoin.WA This Trojan is used to steal sensible information from games. Every time the malware is executed, it drops a clean application named rxcf-green.exe and a malware file named...

View Article

BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article


Image may be NSFW.
Clik here to view.

BitDefender weekly review

Trojan.FakeAV.SQ This e-threat is a very known and wide spread type of malware. Fake AV or rogue security software are the same concepts and have been talked about a lot in the past. Please refer to...

View Article

BitDefender weekly review

Worm.P2P.Palevo.J This is a variant of the Butterfly bot kit, which used to be sold at bfse[removed].net for about $900. The worm is spreading using 3 main vectors: MSN Messenger, removable drives and...

View Article


BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article

BitDefender weekly review

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0;...

View Article


Image may be NSFW.
Clik here to view.

#38 BitDefender weekly review

Worm.Generic.95776 The purpose of this malware is to steal certain MMORPG login credentials. When first executed it will copy itself inside %temp% under the name herss.exe and drop a *.DLL file...

View Article

Zimuse Removal Tool

BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. Two variants are known to this day. Worm.Zimuse.A enters the computer...

View Article

[VIDEO] Security and privacy best practices for Facebook F8 explained by...

After updating the Privacy Controls and silently pushing the Smart Lists , the f8 pushed the usability and privacy to a new level: Subscribers, News Ticker and Wall facelift, and the star of this f8,...

View Article
Browsing latest articles
Browse All 89 View Live




Latest Images