T2W –> Trojan to Worm
We have detected an application whose main function is to turn an executable file into a worm, giving it the capacity to spread itself. Even…
Malware Prevalence May 2008
During the month of May we've seen a 346% growth over April of unique samples actively circulating and infecting users (23.550 samples in May vs.…
Malicious use of Akihabara's killer news
It is surprising how fast the cyber-crooks take advantage of any eye-catching news to distribute malware. Less than two days after the tragic event that…
Another trojan creator…
Everybody knows that nowadays it is very easy to create malicious programs or new variants of malware generally with the help of programs like virus…
Banking Trojans III
In previous posts Banking Trojans I and Banking Trojans II we did an overview of the main banker trojan families and their simple characteristics (files…
Be careful with Tixcet.A
PandaLabs has recently discovered the worm Tixcet.A It is a very destructive worm, as it deletes files with several extensions and replaces them with a…