Ir al contenido principal

New Virus Detected by Trend Micro

ABOUT TREND MICRO VIRUS DETECTED, antivirus, aol, micro, msn, MYDOOM.BB, trend, trend micro, virus, worm, WORM_BROPIA.F, WORM_KIPIS.C, WORM_KIPIS.E, WORM.BAGLE.AZ,  - Althox.blogspot.com
Abaut Trend Micro / Image License Wikimedia Commons

ABOUT TREND MICRO - VIRUS DETECTED

In the period from 21 January to 20 February this year, anti-virus firm Trend Micro reported 3185 new samples of malicious code, of which 1711 are products of samples sent in real time.

In a monthly report, indicated that in the 30 days preceding the 2236 reporting period were documented and stresses that virus detection figures have grown gradually since December 2004. He mentions that in the referred period faced 12 newly discovered vulnerabilities that allow code execution, unauthorized access and disclosure of private information.

Of these vulnerabilities, accurate, eight are considered critical, three important and one was classified as moderate.

Notes that of the specimens, the irruptions of WORM.BAGLE.AZ, WORM_BROPIA.F and had the highest MYDOOM.BB triggered alerts.

He reports that late last January was declared the first alert WORM.BAGLE.AZ 2005 when he appeared, a new variant of the Bagle family, which like its predecessors is a generator of spam you get the addresses in files with certain extensions.

Trend Micro explains that the characteristics of this virus is not enticing filenames used and its rapid spread is due to using false names in the sender, which makes users think that comes from a known source.

WORM-BAGLE.AZ also ends some antivirus and download a file from various websites and additionally compromise the security of the system by opening TCP port 181 to listen for connections from malicious remote users.

Meanwhile, abundant, WORM_BROPIA.F detected on January 20 and which have been discovered 12 variants, is not the first malware that spreads by sending copies of itself directly to the contacts in MSN Messenger, very efficient method to propagate .

According to the report of Trend Micro, this virus is sent to the few connected to MSN Messenger and uses attractive file names for copies it sends and expects that recipients ejecturarán and contaminate the file without knowing their systems.

He mentions that a peculiarity of BROPIA.F is that it installs a worm robot much more damaging: WORM_AGOBOT.AJC, originally leaving spreads copies of itself in shared network drives and run compromises system security by installing a backdoor that allows remote users virtual access to the system.

Indicates that the warning issued to control the spread of WORM_BROPIA.F is the first in history to be released by a worm that spreads by sending copies of itself directly by a system of instant messaging.

In February and after six months of absence in the alerts, a variant of WORM_MYDOOM.M, WORM_MYDOOM.BB, like most of his family, is a spam generator sending copies as an attachment in messages posing as failure notification in email delivery.

Stresses that MYDOOM.BB infections spread from the addresses of their victims through the infected system, but also by programming search engines known online as well as Netsky and Bagle, is considered one of the largest generators of spam.

Another virus that appeared was the Trojan TROJ_SPYWIN.A designed for financial gain and the first launches an attack against Windows antispyware program to locate and disable it and try to delete your files after stealing information related to banking websites electronics.

Trend Micro also produces other less dangerous malicious code as WORM_KIPIS.C, which like WORM_KIPIS.E, searching through attachments and sugary sweet phrases and suggestive names, infect users' computers.

In this case is WORM_AHKER.C, which invites you to download an alleged adult video famous person.

But anti-virus firm also emphasizes the fact that malicious code found in the Messaging Application mode for carrying worms and other malicious programs.

Trend Micro unveils that in the given period met three notable worms for instant messaging applications use ICQ, MSN Messenger and AOL Instant Messenger (AIM) as WORM_VAMPIRE.A that spreads all contacts in the book addresses off ICQ.

The same type is WORM_AIMDES.A that usao AOL messenger and sends a copy of itself to all contacts available from the infected user's account, but unlike others of this type, also sends a message trying to trick recipients on the origin of the file.

Similarly, he adds, the worm robot WORM_SDBOT.APA recorded more than 100 000 infections in less than 30 days, which ranked first in attacks during the referred period and displacing WORM_NETSKY.P the second site.

To ensure teams irreversible effects, Trend Micro reminds users to regularly check the existence of patches issued by Microsoft, and set the system settings according to the recommendations of experts.

Comentarios

Entradas populares de este blog

Tipos de Ábacos, Ábaco Cranmer para Invidentes o Ciegos

Ábaco Cranmer  p ara Personas Ciegas o  Invidentes Fuente Imagen Wikimedia Commons Definición Básica, Ábaco Cranmer para Invidentes Es un "ábaco inventado por Tim Cranmer", de ahí su nombre, llamado comúnmente Ábaco de Cranmer aún comúnmente utilizado por las personas que son invidentes, limitadas visualmente o ciegas. Características del Ábaco Cranmer para Invidentes Una de las principales características del ábaco de Cranmer; es que las esferas, semillas o perlas de conteo, no se deben mover sin que el usuario lo haga, con el fin de evitar ello y facilitar las operaciones realizadas con este, Tim Cranmer, ideó un mecanismo que trabara o frenara dichas esferas, semillas o perlas con el fin de facilitar la manipulación del mismo, Un trozo de tela suave o de goma se coloca detrás de los granos de manera para que no se muevan inadvertidamente. Lo anterior, evita que los granos se muevan de su lugar, mientras los usuarios se sientan a manipularlos, po

Comportamiento Aberrante

Aberrada Social Jane Toppan Asesina Serial Fuente:  Wikimedia Commons Imagen  Dominio Público Desviación en un contexto sociológico se describe como las acciones o conductas que violan las normas culturales, incluyendo formalmente las normas promulgadas (por ejemplo: La delincuencia). Así como las violaciones informales de las normas sociales (por ejemplo: El rechazo a las costumbres). En el ámbito de los sociólogos, psicólogos, psiquiatras; y criminólogos que estudian cómo estas normas se crean, cómo cambian con el tiempo y cómo se cumplen, así pues el incumplimiento de las mismas se considera un acto Aberrante. Aberración o Desviación de las Normas Sociales y Violación de las mismas y Comportamiento Aberrante Los condicionamientos sociales están regidos por las normas específicas de comportamiento, las formas en que las personas se supone que deben actuar, los paradigmas de comportamiento predecible en la sociedad. Dichos comportamientos sociales, NO so

Tipos de Ábacos - Ábaco Egipcio

Fuente Imagen Wikimedia Commons, Photorack Net Imagen Libre de Derechos de Autor En sus famosas crónicas históricas, ya Herodoto nos hablaba del Ábaco Egipcio, de manera sencilla y clara Herodoto, nos dice que el Ábaco Egipcio, funcionaba al contrario del Ábaco Griego, es decir que los discos que se utilizaban como especie de esferas para contar; similares al uso que se les daba en el ábaco actual occidental. Pero a diferencia del ábaco básico actual, el Ábaco Egipcio se utilizaba de manera inversa al Ábaco Griego.  Carentes Pruebas Arqueológicas del Ábaco Egipcio La información que se dispone al respecto es meramente subjetiva y suposicional, ya que no hay pruebas contundentes del el uso exacto que se le daba a este Ábaco Egipcio. Sin embargo los arqueólogos, han encontrado discos que se cree hacían parte de personalizados y sofisticados Ábacos Egipcios. Historia del Ábaco Egipcio Otras fuentes históricas, aseguran que el origen del Ábaco se remonta al antiguo E