Free commandline scanner
For research purposes we are releasing our command-line scanners and signature updates for those who wish to implement malware scanning in a not-for-profit project. Organizations…
PINCH, THE TROJAN CREATOR
Some time ago, we talked to you about malware prices, HTTP botnets, etc. Today I will show you the level Trojan creators have reached and…
A new case of RansomWare !!!
We have detected a new case of RansomWare. Once the malware infects users and encrypts their files, several “read_me.txt†files are created in the infected…
Spammers: PDF rules!
A few weeks ago a spam attack was launched – as it happens everyday. But that time there was something new. It was a pump…
June spyware list
This month, Application/MyWebSearch joins the list in the first position, with only 36 detections less than Adware/Lop, which goes down to the second position. …
A profitable use for stolen credit cards
We have often talked about the freedom with which certain cyber-crooks circulate around the Internet, but I must admit that even I am surprised sometimes……
Rootkits in the mist
During the last 7 months we've been able to gather some really interesting statistics thanks to Panda Anti-Rootkit on which rootkits are most actively infecting…