Posts by author
Panda Security
ANI vulnerability and malware researchers… be careful
Last week (thursday and friday) was very hard for all malware researchers, working with the “new” ANI threat. Too much and different information were released.…
Panda AntiRootkit Official Release
We're very glad to announce that Panda AntiRootkit 1.06 has finally been officially released for the mass market. It has taken a while since we've…
March Spyware list
The six first positions of the March top ten are the same as the previous month: 1: Adware/Lop 2: Adware/Gator 3: Application/MyWebSearch 4: Adware/SaveNow 5:…
A "new" ANI vulnerability in the wild
It’s real, it’s not a “deja vรยน”. Yesterday, March 29, a new 0-day exploit with the ANI file format was discovered in the wild. This vulnerability…
eCrime 2007 Congress
Yesterday the 2007 eCrime Congress finished in London. We had a good time there, met some interesting people and learned a lot about how financial…
A fast and easy way to identify a system in a local network
We know some tools and techniques to remote OS detection via TCP/IP Stack FingerPrinting: nmap, Queso, p0f,… These tools use advanced techniques to identify the…
Insecure features : should AV companies detect them?
These days we have been analyzing one of the latest MySpace threats, JS/MySpace.A, which uses an interesting QuickTime feature : HREF Tracks. A deep analysis…