416 posts
Packer (r)evolution
We know for sure that cyber-criminals use private tools to check AV detection prior to releasing new malware in the wild, making sure it goes…
New MS Access exploit
Last week, John Fellers sent us a sample that exploited a flaw in MS Access. We thought it was the same vulnerability sent to Bugtraq…
Annual Report 2007 PandaLabs
We have just released the Annual report PandaLabs 2007, which summarizes the most important events of the last year. Inside you will find interesting information…
Pandalabs Quarterly Report July-September 2007
Today, we have released our Quarterly Report. Inside you will find interesting information regarding trends on malware. This time we include a comparative review of "Kits for…
Security in VoIP Systems
One of the tasks of security companies is to "forecast" what will happen in the future based in the data and trends we observe. This…
September spyware list
This month, there have been no changes in the first positions of the ranking, so the list remains the same as last month’s: 1.-…
August spyware list
This month there has been some changes in the first positions with regard to the previous one: Adware/Gator goes up from the third to the…