Posts by author
Panda Security
Security in wireless networks
WiFi has been around for several years now, and it is currently an established and accepted technology. Some WiFi spots allow users to access the…
First MS06-70, then WKSSVC
On November 14th, Microsoft released the security bulletin MS06-070, regarding a critical vulnerability in the Workstation service. This vulnerability can be exploited across the Internet,…
Spamta goes on, and on, and on…
We were aching for another wave of Spamtas (Stration/Warezov), and here it is. We have seen "a few" more Spamtas around the clock and we have…
New worm
We have come across a new worm in the lab, "Foamer". For an unknown reason it hates DOS command line screens, so it modifies the Windows Registry…
Information Leaking: Malware vs. Garbage Bags
In the lab we have lots of examples of malware that steal information. We have banker Trojans, keyloggers, password stealers, etc. We are getting used to hearing about laptop…
e-Gold Phish
We have received some emails, with a notification about unusual behaviour on our account, and that we need to verify our identity. Of course you…
Spam as a financial tool (IV)
We keep receiving new samples of yesterday's stock scam. This new wave, informs about a slight drop, but assures that this is going to change and…