Search
Keyword: link
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It takes ...
This security update resolves a publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows.T...
Rumors are circulating that the public version of iOS 8.4 is about to be released to the general public in the next few weeks, though Apple has kept mum about the exact date.Last month,...
This joke program plays the music video of Friday by Rebecca Black while randomly moving around the browser window.It continuously displays a message box 579 times.This joke program may be hosted on a website and run when a user accesses the said we...
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.How...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.
Spammers started the year right with an email message that supposedly led to New Year’s e-cards. Various versions of the spammed messages circulated online with two new malware in tow. The systems of unwitting user...
We spotted a recent spam campaign in Italian that delivers URSNIF malware to unsuspecting users. The email deceives its recipients by posing as a notification with a link that leads to the supposed receip...
The abuse of cloud sharing services such as Google Drive and Google Docs was last seen in March 2023, in which threat actors targeted Latin American countries, distr...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
This malware spreads via the <i>Facebook</i> chat feature. It entices users to click a link by saying that it leads to an execution video of Osama bin Laden.To get a one-glance comprehensive view of the behavior of this Trojan, refer to t...
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
This worm may be dropped by other malware.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It opens a specific port where it listens for remote commands.It sends ICMP PING requests to a series of IP addresses and scans for Port 4899 to check if those IP addresses have RADMIN service running. Once successful, it may use a hard-coded list of...
Users may find e-mails coming from a known antivirus company nothing to be surprised about, but alarms should definitely start ringing when the antivirus company mailing you ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It monitors user transactions on certain sites.It connects to certain websites to send and receive informat...