Quantcast

Latest Computer worm Stories

2010-06-23 07:30:00

ORLANDO, Fla., June 23 /PRNewswire/ -- PandaLabs, Panda Security's antimalware laboratory, has revealed that malware designed to infect iPhones can also compromise the popular iPad, as demonstrated in a video on the PandaLabs blog at http://www.pandalabs.com. "This doesn't mean we're about to face an avalanche of infections. We have always stated that as Apple increases its market share, cyber-crooks will begin to show more interest in targeting the platform," said Luis Corrons,...

2010-06-16 13:43:00

ORLANDO, Fla., June 16 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, The Cloud Security Company, has reported the proliferation of scams hijacking the Facebook "Like" option. The attack uses eye-catching messages related to the popular game Farmville, the "Sex and the City 2" movie or the keyword sex to grab the attention of logged-in Facebook users as they browse Web pages with the "Like" button, the Facebook wall feature or messaging system. Clicking the link...

493778a9e49c73538cb1f7ea63cea7c01
2010-06-14 09:39:15

Polychaete worms have populated the oceans for millions of years. Today they are the focus of study on cryptic species, which shows that apparently identical animals may be entirely different species. Researchers at the University of Gothenburg, Sweden, have now found new worm species in the Kattegat and Skagerrak. Polychaetes belong to a group of segmented worms that display enormous diversity. It turns out that there may be significantly more of these worms than researchers had imagined....

2010-03-30 12:29:00

ORLANDO, Fla., March 30 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, has published its Q1 2010 report, analyzing the IT security events and incidents of the first three months of the year. The report can be downloaded for free at: http://www.pandasecurity.com/homeusers/security-info/tools/reports.htm. As forecasted by PandaLabs, the amount of new malware in circulation has continued to increase at a record pace. In this first quarter, the most prevalent...

8fee250314457ad72ed8e87e103c74331
2010-02-27 08:25:00

Is it possible to hide honeypot traps from Botnet drones Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to attack because of advances in Botnet...

2010-02-18 10:06:00

ORLANDO, Fla., Feb. 18 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, the Cloud Security Company, has detected a new worm, Spybot.AKB. It spreads using Peer-to-Peer (P2P) programs by copying itself to the usual shared folders with different names, and also via email. What's new about Spybot.AKB is the way it tricks users, spreading under the guise of an invitation to join social networks like Twitter and Hi5, or in an email that appears to be from Google,...

2010-02-12 07:30:00

ORLANDO, Fla., Feb. 12 /PRNewswire/ -- PandaLabs, Panda Security's malware analysis and detection laboratory, warns that cybercriminals are continuing to exploit Valentine's Day with holiday-themed malware as a lure to trick users and infect computers. As in years past, Internet users can expect to see numerous e-mails this weekend with links to malicious downloads, which are often perpetrated through romantic greeting cards or messages with subject lines related to Valentine's Day. In...

493ad8043d3a27d03383494142c04853
2010-02-01 11:10:55

Self-propagating worms are malicious computer programs, which, after being released, can spread throughout networks without human control, stealing or erasing hard drive data, interfering with pre-installed programs and slowing, even crashing, home and work computers. Now a new code, or algorithm, created by Penn State researchers targets the "stealthiest" of these worms, containing them before an outbreak can occur. "In 2001 the 'Code Red' worms caused $2 billion dollars worth of damage...

2010-01-14 07:00:00

MILFORD, Conn., Jan. 14 /PRNewswire/ -- Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, today unveiled its Top 10 Information Security Threats for 2010. (Photo: http://www.newscom.com/cgi-bin/prnh/20100114/NY37508 ) "The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they'll be...

2010-01-05 07:30:00

GLENDALE, Calif., Jan. 5 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, has published its Annual Malware Report, which reviews the major incidents and events concerning IT security in 2009. The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total of 15 million throughout the rest of Panda Security's 20-year history. The report is available...


Word of the Day
vermicular
  • Like a worm in form or movement; vermiform; tortuous or sinuous; also, writhing or wriggling.
  • Like the track or trace of a worm; appearing as if worm-eaten; vermiculate.
  • Marked with fine, close-set, wavy or tortuous lines of color; vermiculated.
  • A form of rusticated masonry which is so wrought as to appear thickly indented with worm-tracks.
This word ultimately comes from the Latin 'vermis,' worm.
Related