Quantcast
Last updated on April 24, 2014 at 21:24 EDT

Latest Computer worm Stories

8fee250314457ad72ed8e87e103c74331
2010-02-27 08:25:00

Is it possible to hide honeypot traps from Botnet drones Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to attack because of advances in Botnet...

2010-02-18 10:06:00

ORLANDO, Fla., Feb. 18 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, the Cloud Security Company, has detected a new worm, Spybot.AKB. It spreads using Peer-to-Peer (P2P) programs by copying itself to the usual shared folders with different names, and also via email. What's new about Spybot.AKB is the way it tricks users, spreading under the guise of an invitation to join social networks like Twitter and Hi5, or in an email that appears to be from Google,...

2010-02-12 07:30:00

ORLANDO, Fla., Feb. 12 /PRNewswire/ -- PandaLabs, Panda Security's malware analysis and detection laboratory, warns that cybercriminals are continuing to exploit Valentine's Day with holiday-themed malware as a lure to trick users and infect computers. As in years past, Internet users can expect to see numerous e-mails this weekend with links to malicious downloads, which are often perpetrated through romantic greeting cards or messages with subject lines related to Valentine's Day. In...

493ad8043d3a27d03383494142c04853
2010-02-01 11:10:55

Self-propagating worms are malicious computer programs, which, after being released, can spread throughout networks without human control, stealing or erasing hard drive data, interfering with pre-installed programs and slowing, even crashing, home and work computers. Now a new code, or algorithm, created by Penn State researchers targets the "stealthiest" of these worms, containing them before an outbreak can occur. "In 2001 the 'Code Red' worms caused $2 billion dollars worth of damage...

2010-01-14 07:00:00

MILFORD, Conn., Jan. 14 /PRNewswire/ -- Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, today unveiled its Top 10 Information Security Threats for 2010. (Photo: http://www.newscom.com/cgi-bin/prnh/20100114/NY37508 ) "The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they'll be...

2010-01-05 07:30:00

GLENDALE, Calif., Jan. 5 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, has published its Annual Malware Report, which reviews the major incidents and events concerning IT security in 2009. The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total of 15 million throughout the rest of Panda Security's 20-year history. The report is available...

2009-12-30 07:30:00

GLENDALE, Calif., Dec. 30 /PRNewswire/ -- PandaLabs, the anti-malware laboratory of Panda Security, has published its 2009 Virus Yearbook, examining the most intriguing malicious codes to emerge over the last 12 months. Rather than spotlighting the most widespread viruses, or those that have caused the most infections, PandaLabs has selected those which stood out most for their use of social engineering or visible effects on users' PCs. For this reason, some of the more well-known...

2009-12-16 12:36:00

GLENDALE, Calif., Dec. 16 /PRNewswire/ -- PandaLabs, Panda Security's malware analysis and detection laboratory, has released its forecast of computer threat trends for 2010. PandaLabs predicts that in 2010, the amount of malware in circulation will continue to grow exponentially as it has in 2009. As anti-malware technologies are able to respond closer to real-time through cloud-based innovations such as Panda's Collective Intelligence, malware creators will respond by generating even...

2009-12-09 08:00:00

ISLANDIA, N.Y., Dec. 9 /PRNewswire-FirstCall/ -- The latest State of the Internet 2009 report issued today by CA, Inc. (Nasdaq: CA) states that the most notable 2009 online threats were rogue/fake security software, major search engines, social networks and Web 2.0 threats. The report, based on data compiled by CA's Global Security Advisor researchers, compiles trends from the first half of 2009. CA security researchers also offer predictions for the top Internet threats for 2010,...

2009-12-09 07:30:00

GLENDALE, Calif., Dec. 9 /PRNewswire/ -- Cybercriminals are capitalizing on the Christmas holiday in a new Facebook scam that renders users' computers useless, reports PandaLabs, Panda Security's malware analysis and detection laboratory. Following the posting of malicious links on Facebook users' walls, the bait directs to a fake embedded video player that poses as a Christmas greeting. When users try to play the video or click on a link on the page, their computers download and install...