1644 posts
Fake Internet Explorer 7.0 Beta
This weekend we have seen several spam messages sent in order to infect users with a new Trojan. It is being distributed as if it were an…
Cybercrime… for sale (II)
In this post, we continue talking about the price of malware, focusing on the price of software (Trojans, joiners, etc.): Keylogger Teller 2.0: typical keylogger;…
April spyware list
This month, Adware/Gator gains the first position again, with only 75 more detections than Adware/Lop. 1: Adware/Gator2: Adware/Lop3: Application/MyWebSearch4: Application/Winantivirus20065: Spyware/Virtumonde6: Adware/SaveNow Application/Winantivirus2006 moves 2…
Cybercrime… for sale (I)
You have probably wondered at some time or another why there is so much malware. As we have lately explained on so many occasions, most…
W32/Spamta.WF.worm
In the last hours we have received a few hundreds e-mails containing the worm Spamta.WF. The attached file has one of the following extensions: bat…
eCrime 2007 Congress
Yesterday the 2007 eCrime Congress finished in London. We had a good time there, met some interesting people and learned a lot about how financial…
A fast and easy way to identify a system in a local network
We know some tools and techniques to remote OS detection via TCP/IP Stack FingerPrinting: nmap, Queso, p0f,… These tools use advanced techniques to identify the…