Keyword: ZZ-TOP
221 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
(MS10-019) Vulnerabilities in Windows Could Allow Remote Code Execution (981210) This security update resolves two privately reported vulnerabilities in Windows Authenticode Verification tha...
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS10-071) Cumulative Security Update for Internet Explorer (2360131)Risk Rating: Critical This security update ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It displays advertisements on Internet browsers.
  Background of the Attack

In a recent spam run, TrendLabsSM engineers came a...

Mobile devices have become “must have” in today’s technology-driven society. Because of the convenience, advance computing features, and impressive Web connectivity these offer, consumers and organizations alike are ...
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
What are PALEVO malware?The PALEVO family of worms has been around since the second quarter of 2009. It only gained significant press coverage, however, when some of the people behind the Mariposa botnet ...
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects certain file types by inserting code in the said files.It terminates itself if it detects it is b...
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acces...
This Worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It terminates itself if it detects it is being run in a virtual environment.
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
Facebook's constant site improvement has recently attracted a lot more cybercriminals to take advantage of and exploit the social networking site for malicious intent.As of December 5, 2010, Facebook introduced so...
This security update addresses several privately reported vulnerabilities in Microsoft Windows. The most serious of these may allow elevation of privilege if an ...
Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse the Excel file format, which allows remote attackers to e...
With Christmas just a day away, many users are taking the time out to send cards to their loved ones. Cybercriminals are well aware of this and they recently sent out a curious Christmas card to trick users.The spamme...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
A Cross Site Scripting vulnerability was found in the Top 10 - Popular Posts WordPress Plugin. This vulnerability allows an attacker to perform a actions such as stealing Admi...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies Internet Explorer security settings. This puts the affected computer at greater risk, as it all...