Featured Articles

Intel releases tiny 3G cell modem

Intel releases tiny 3G cell modem

Intel has released a 3G cellular modem with an integrated power amplifier that fits into a 300 mm2 footprint, claiming it…

More...
Braswell 14nm Atom slips to Q2 15

Braswell 14nm Atom slips to Q2 15

It's not all rosy in the house of Intel. It seems that upcoming Atom out-of-order cores might be giving this semiconductor…

More...
TSMC 16nm wafers coming in Q1 2015

TSMC 16nm wafers coming in Q1 2015

TSMC will start producing 16nm wafers in the first quarter of 2015. Sometime in the second quarter production should ramp up…

More...
Skylake-S LGA is 35W to 95W TDP part

Skylake-S LGA is 35W to 95W TDP part

Skylake-S is the ‘tock’ of the Haswell architecture and despite being delayed from the original plan, this desktop part is scheduled…

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 09 March 2012 12:42

Fake anti-virus software on the increase

Written by Nick Farrell



Top ten virus threats reported


Fake antivirus applications are on the increase according to a report from GFI Software. In its top ten collection of the 10 most prevalent threat detections encountered during the month, the insecurity experts found that there was a new wave of or rogue Avs.

Growing since the start of the year, last month brought a significant spike in new variations of rogue AV, the report said. Christopher Boyd, senior threat researcher at GFI Software said that while the velocity at which rogues were successfully propagating may have slowed toward the end of last year, they are certainly back now, and they remain a popular tactic among cybercriminals.

Many rogue AV programs are being distributed via spam containing malicious links to the Blackhole exploit, a tool used by cybercriminals to target unpatched vulnerabilities in software applications from industry leaders like Microsoft and Adobe.  Users infected by rogue AV may be redirected to fraudulent websites, have their systems hijacked by software appearing to scan their PCs or plagued by messages warning of viruses and other PC security risk. These scareware tactics trick users into providing credit card data to purchase non-existent protection.

To make matters worse rogue AV utilities are continually tweaked in an attempt to avoid detection, with newer variants of these malicious applications propagating every 12 to 24 hours.

The outfits 10 Threat Detections for February are:


Detection                                              Type                                         Percent

Trojan.Win32.Generic                             Trojan                                       35.63

GamePlayLabs                                      Browser Plug-in                         3.66

Yontoo                                                 Adware                                     2.79

INF.Autorun (v)                                      Trojan                                       1.41

Trojan.Win32.Ramnit.c (v)                      Trojan                                       1.02

Trojan-Spy.Win32.Zbot.gen                    Trojan                                       0.94

Virus.Win32.Sality.at (v)                         Virus.W32                                 0.94

Worm.Win32.Downad.Gen (v)                Worm.W32                                0.92

Trojan.Win32.Jpgiframe (v)                    Trojan                                       0.87

GameVance                                          Adware (General)                       0.87

 

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments