Malicious Spam Related to False Porntube Page
It seems that the activity of this type of spamtraps has increased since the first time we detected it last week. Like every spam message…
Panda Internet Security 2009 BETA
We've recently released the new Panda Internet Security 2009 to public beta. This is the first product to use "scanning from the cloud" technology based…
T2W –> Trojan to Worm
We have detected an application whose main function is to turn an executable file into a worm, giving it the capacity to spread itself. Even…
Malware Prevalence May 2008
During the month of May we've seen a 346% growth over April of unique samples actively circulating and infecting users (23.550 samples in May vs.…
Malicious use of Akihabara's killer news
It is surprising how fast the cyber-crooks take advantage of any eye-catching news to distribute malware. Less than two days after the tragic event that…
Another trojan creator…
Everybody knows that nowadays it is very easy to create malicious programs or new variants of malware generally with the help of programs like virus…
Banking Trojans III
In previous posts Banking Trojans I and Banking Trojans II we did an overview of the main banker trojan families and their simple characteristics (files…