The 5 all-time worst malware according to Trend Micro

August 22, 2009 · Filed Under News, Security · Comment 

News - A succession of fresh, quality news, from inside and outside of the WebTrend Micro, a Tokyo-based security enterprise with over 4,000 employees in more than 30 countries, has recently asked the experts from TrendLabs (its global research organization) to make an updated list of the worst computer plagues ever. The resulting list includes 5 noteworthy examples of widespread infections which represented, during their respective period of wider circulation, the most dangerous security threats users and companies could have faced.

Read more

Klaatu, barada, nikto, Conficker!

April 10, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances More than a week after the 1st of April, the day when the Internet stood still because according to the press the Conficker/Downup/Downadup/Kido worm could have destroyed the net, the infrastructures, civilized mankind and the entire planet things are going more or less as usual: Internet remains a dangerous place but it hasn’t exploded like a supernova, and bits are flowing quickly from a part to another one of the planet. The true novelty is that the botnet built up by one of the most complex malware ever finally shows what its true purpose is.

Read more

Rootkits penetrate the heart of the machine

April 7, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances Since, in 2005, the nasty commercial policies of Sony BMG uncovered the possibility to seize control on the operating system to hinder the normal working of the PC and peripherals, the evolution of rootkit software went through an unparalleled acceleration. The interest for the matter rose in research and among cyber-criminals gangs, with the result that can be esteemed in these days: rootkits have reached the lowest levels of electronic devices circuitry by infecting network routers, the BIOS and even the most privileged working mode of the x86 processors.

Read more

Conficker worm asks for instructions and gets an update

March 16, 2009 · Filed Under News, Security · 13 Comments 

News - A succession of fresh, quality news, from inside and outside of the WebConficker/Downup/Downadup/Kido malware, Symantec writes in the first edition of The Downadup Codex, “is, to date, one of the most complex worms in the history of malicious code“. At first spread through a flaw within the Windows Server service, the threat has grown immensely because of a combination of elements that facilitated its diffusion and drove the IT industry to unite in the attempt to block its further proliferation.

Read more

Conficker, it’s open war between the industry and malware writers

February 27, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances Conficker (also known as Downup, Downadup or Kido) is the worm that first, after the Sasser outbreak in 2004, was able to exploit a flaw in a Windows remote service, and due to this unusual ability the malware became in turn the target of a large part of the IT industry that, leaded by Microsoft, is trying in these days to defuse the time bomb of an enormous botnet yet with unknown practical outcomes.

Read more

Sality virus, the species evolution

February 9, 2009 · Filed Under News, Security · 1 Comment 

News - A succession of fresh, quality news, from inside and outside of the WebThe numbers clearly demonstrate it, nowadays the main threats to computer security are those coming from worms, trojans, backdoors, malicious code categories that have nothing to do with the historical “viruses”. But those digital parasites which travelled from file to file (and from floppy to floppy), hunting for new habitats and new victims to infect still survive today when malware is a business and the worm-based botnets have a scary amount of zombie-PC to use against institutions, firms or the network infrastructures of entire nations.

Read more

Conficker, the perfect storm worm

January 23, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances The Conficker worm, also known as Downup, Downadup or Kido, is floating around since October 2008. Security firms know it pretty well, and in the past days the malware has become known as much well to users too having infected a significant amount of machines all over the world. We have returned to the “good” old times of Sasser, Blaster and Mydoom outbreaks, and the already worrisome proliferation of the worm threatens to get even worse because of some conditions that increasingly support its spreading.

Read more

22,000 new malware samples per day, a network worm breakout and the sandbox-enabled antivirus

January 12, 2009 · Filed Under News, Security · 2 Comments 

News - A succession of fresh, quality news, from inside and outside of the WebFrom a computer security standpoint, 2008 surely has been a year of passion. Nay worse, it has been a dramatic year characterized by figures beyond any imagination, a steady hammering of new threats that has lasted till the end and that is expected to be the same or even worse during this year.

Read more

Internet? A very dangerous place

December 13, 2008 · Filed Under News, Security · Comment 

News - A succession of fresh, quality news, from inside and outside of the WebTrend Micro security enterprise has ranked the attack vectors exploited by the 100 most widespread malware from January to November 2008, and the results speak by themselves: among all the possible infection ways Internet is absolutely the most used (or better still abused) one by worms, trojans and other types of digital pathogenetic agents constantly hunting for victims and unprotected systems to compromise.

Read more