Content
Current Malware
Malware-
A malicious program. Viruses and Trojans are examples of malware. Potentially unwanted programs (PUPs) are not considered malware.
Threat | Date Published |
---|---|
Downloader-UA.h | 02 May 2008 |
BackDoor-DNM | 21 Feb 2008 |
Generic FakeAlert.a | 25 Oct 2007 |
Spy-Agent.bw | 20 Aug 2007 |
Downloader.gen.a | 30 Jul 2007 |
Top Potentially Unwanted Programs (PUPs)
PUPs-
Software programs written by legitimate companies that may alter the security state or the privacy posture of the computer on which they are installed. This software can but does not necessarily include spyware, adware, and dialers, and could be downloaded in conjunction with a program that the user wants. Security-minded users know about such programs and, in some case, have them removed.
Threat | Date Discovered |
---|---|
Generic PUP.z | 11 Sep 2008 |
WebThunder | 31 May 2007 |
Generic PUP.x | 19 Mar 2007 |
Adware-Url.gen | 08 Jul 2005 |
Adware-ZangoSA | 14 Jun 2005 |
Adware-Websearch | 11 Mar 2005 |
Adware-GameSpyArcade | 19 Jan 2005 |
with fishy extension | 04 Aug 2004 |
Adware-180SA | 12 Jun 2003 |
RemAdm-PSKill | 27 Feb 2002 |
Virus Map
Get a real-time, bird's-eye view of where computers around the globe are detecting viruses.
Current Vulnerabilities
Vulnerability-
Exploitable defect in a software application or operating system, allowing others to crash systems, access information on systems, or use systems for their own purposes.
Threat | Date Public |
---|---|
MS08-037 DNS Sck Ent.. | 08 Jul 2008 |
MS08-037 DNS Cache P.. | 08 Jul 2008 |
MS08-033 WMP SAMI Pa.. | 10 Jun 2008 |
MS08-033 MJPEG Decode | 10 Jun 2008 |
MS08-021 MS GDI Stack | 08 Apr 2008 |
MS08-001 MS IGMPv3 | 08 Jan 2008 |
Latest Spam Activity
Spam-
Unwanted e-mail, specifically unsolicited bulk e-mail. Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.
View Top 10 Spam Subject Lines
Top Phish scams
Phishing-
A method of fraudulently obtaining personal information, such as passwords, social security numbers, and credit card details, by sending spoofed e-mails that look like they come from trusted sources, such as banks or legitimate companies. Typically, phishing e-mails request that recipients click on the link in the e-mail to verify or update contact details or credit card information. Like spam, phishing e-mail go to a large number of e-mail addresses expecting that someone will read the spam and disclose their personal information.
- Wachovia Connection Installation and Upgrade Warning.
- Wachovia Connection Alert - Update.
- What is Wachovia Security PlusSM
- Wachovia Connection Customer Support - Security Updates.
- Wachovia Connection - Security Fix.