Featured Articles

5th Generation Broadwell 14nm family comes in three lines

5th Generation Broadwell 14nm family comes in three lines

Intel's 5th Core processor family, codenamed Broadwell, will launch in three lines for the mobile segment. We are talking about upcoming…

More...
Broadwell Chromebooks coming in late Q1 2015

Broadwell Chromebooks coming in late Q1 2015

Google's Chromebook OS should be updating automatically every six weeks, but Intel doesn't come close with its hardware refresh schedule.

More...
New round of Nexus phone rumour kicks off

New round of Nexus phone rumour kicks off

Rumours involving upcoming Nexus devices are nothing uncommon, but this year there is a fair bit of confusion, especially on the…

More...
Nvidia officially launches the 8-inch Shield Tablet

Nvidia officially launches the 8-inch Shield Tablet

As expected and reported earlier, Nvidia has now officially announced its newest Shield device, the new 8-inch Shield Tablet. While the…

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 09 March 2012 12:42

Fake anti-virus software on the increase

Written by Nick Farrell



Top ten virus threats reported


Fake antivirus applications are on the increase according to a report from GFI Software. In its top ten collection of the 10 most prevalent threat detections encountered during the month, the insecurity experts found that there was a new wave of or rogue Avs.

Growing since the start of the year, last month brought a significant spike in new variations of rogue AV, the report said. Christopher Boyd, senior threat researcher at GFI Software said that while the velocity at which rogues were successfully propagating may have slowed toward the end of last year, they are certainly back now, and they remain a popular tactic among cybercriminals.

Many rogue AV programs are being distributed via spam containing malicious links to the Blackhole exploit, a tool used by cybercriminals to target unpatched vulnerabilities in software applications from industry leaders like Microsoft and Adobe.  Users infected by rogue AV may be redirected to fraudulent websites, have their systems hijacked by software appearing to scan their PCs or plagued by messages warning of viruses and other PC security risk. These scareware tactics trick users into providing credit card data to purchase non-existent protection.

To make matters worse rogue AV utilities are continually tweaked in an attempt to avoid detection, with newer variants of these malicious applications propagating every 12 to 24 hours.

The outfits 10 Threat Detections for February are:


Detection                                              Type                                         Percent

Trojan.Win32.Generic                             Trojan                                       35.63

GamePlayLabs                                      Browser Plug-in                         3.66

Yontoo                                                 Adware                                     2.79

INF.Autorun (v)                                      Trojan                                       1.41

Trojan.Win32.Ramnit.c (v)                      Trojan                                       1.02

Trojan-Spy.Win32.Zbot.gen                    Trojan                                       0.94

Virus.Win32.Sality.at (v)                         Virus.W32                                 0.94

Worm.Win32.Downad.Gen (v)                Worm.W32                                0.92

Trojan.Win32.Jpgiframe (v)                    Trojan                                       0.87

GameVance                                          Adware (General)                       0.87

 

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments