Posts Tagged ‘Trojan Horses’

McAfee logoIn the second quarter of 2012, the company’s specialists McAfee was found on 1.5 million more malware than in the first quarter of 2012, number of malicious programs has grown at a rate of approximately 100 thousand samples per day – such data is presented in the report on threats to McAfee. “This increase in the number of detected malware has not been seen for four years,” – the company said.

“Over the last quarter we have often found good examples of malware threatening ordinary consumers, businesses and critical infrastructure,” – said Vincent Weafer, senior vice president of McAfee Labs. – Some of the biggest attacks using malware in the second quarter of 2012 include Flashback, aimed at device Macintosh, and Flame, the object of which was the energy sector. This is a good illustration of the growing number of threats. ” (more…)

McAfee: report about threats

McAfee logoYesterday, McAfee released report about threats for of the second quarter 2012. According to the report, this increase in the number of detected malicious program has not been seen for four years. McAfee Labs found 1.5 million more malware than in the first quarter of 2012, and faced with new kinds of security threats, “drive-by downloads” and programs-extortionists for mobile devices, and the use of Twitter to manage mobile botnets.

Using their own methods of analysis and study of threats, McAfee Labs stated rapid replenishment of its “zoo” threats of malware of various kinds. The number of malicious programs has grown at a rate of approximately 100,000 samples each day. In the report, McAfee identified the main types of malware, pose a threat to a large number of users across the world. (more…)

Computer VirusesBrute force attacks – the so-called attack by the “brute force”. Typically, users use simple passwords, such as “123”, “admin”, etc. These and enjoy computer hackers, who with the help of special calculates the Trojans to penetrate the network password brute – based embedded in the program password dictionary or generate a random sequence of characters.

Keyloggers – kind of Trojans, whose main function is to capture user input via the keyboard. The objects of the abduction are personal and network passwords, logins, credit card details and other personal information.

Backdoors – programs that provide input into the system or receiving the privileged function (mode), bypassing the existing system of authority. Often used to circumvent existing security system. Hatches do not infect files, but registers itself in the registry, thus modifying the registry keys. (more…)