Content

BREAKING ADVISORY

September 9, 2008.  As announced, Microsoft released four critical updates today. The potential impact, for all bulletins, is remote code execution. The affected components include Microsoft Windows, Microsoft Office, Microsoft Internet Explorer, the .NET Framework, Microsoft SQL Server, and Microsoft Visual Studio software.

Learn More

Current Malware

Malware-

A malicious program. Viruses and Trojans are examples of malware. Potentially unwanted programs (PUPs) are not considered malware.

ThreatDate Published
Downloader-UA.h02 May 2008
BackDoor-DNM21 Feb 2008
Generic FakeAlert.a25 Oct 2007
Spy-Agent.bw20 Aug 2007
Downloader.gen.a30 Jul 2007

Top Potentially Unwanted Programs (PUPs)

PUPs-

Software programs written by legitimate companies that may alter the security state or the privacy posture of the computer on which they are installed. This software can but does not necessarily include spyware, adware, and dialers, and could be downloaded in conjunction with a program that the user wants. Security-minded users know about such programs and, in some case, have them removed.

Threat Date Discovered
Generic PUP.z 11 Sep 2008
WebThunder 31 May 2007
Generic PUP.x 19 Mar 2007
Adware-Url.gen 08 Jul 2005
Adware-ZangoSA 14 Jun 2005
Adware-Websearch 11 Mar 2005
Adware-GameSpyArcade 19 Jan 2005
with fishy extension 04 Aug 2004
Adware-180SA 12 Jun 2003
RemAdm-PSKill 27 Feb 2002

Virus Map

Get a real-time, bird's-eye view of where computers around the globe are detecting viruses.

Virus Map

Current Vulnerabilities

Vulnerability-

Exploitable defect in a software application or operating system, allowing others to crash systems, access information on systems, or use systems for their own purposes.

ThreatDate Public
MS08-037 DNS Sck Ent..08 Jul 2008
MS08-037 DNS Cache P..08 Jul 2008
MS08-033 WMP SAMI Pa..10 Jun 2008
MS08-033 MJPEG Decode10 Jun 2008
MS08-021 MS GDI Stack08 Apr 2008
MS08-001 MS IGMPv308 Jan 2008

Latest Spam Activity

Spam-

Unwanted e-mail, specifically unsolicited bulk e-mail. Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.

Current Spam Categories

Tips to Avoid Spam

View Top 10 Spam Subject Lines

Top Phish scams

Phishing-

A method of fraudulently obtaining personal information, such as passwords, social security numbers, and credit card details, by sending spoofed e-mails that look like they come from trusted sources, such as banks or legitimate companies. Typically, phishing e-mails request that recipients click on the link in the e-mail to verify or update contact details or credit card information. Like spam, phishing e-mail go to a large number of e-mail addresses expecting that someone will read the spam and disclose their personal information.

 

 

  1. Wachovia Connection Installation and Upgrade Warning.
  2. Wachovia Connection Alert - Update.
  3. What is Wachovia Security PlusSM
  4. Wachovia Connection Customer Support - Security Updates.
  5. Wachovia Connection - Security Fix.

View Top 10 Phish Scams