Growth variants threat or the threat of computer viruses and the like increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This becomes the cause of the increase in activity associated with the virtual world.
Level growing threats in various forms to reach a high level and almost predictable even endanger human life will trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small error may trigger a nuclear danger.
Here are the top 10 malware roaming in cyberspace Indonesia that successfully detected by ESET Threat Sense Lab. Perhaps one of them to infect our computers.
1. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%
Win32/Conficker.AA is a worm that spreads through shared folders and mobile media devices. This worm into computers by exploiting vulnerabilities in the Server Service. After Conficker.AA successful, the sending computer will perform remote control of victim computers that have been infected and downloading.
2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%
Win32/Conficker.AE is a worm that is also one of Conficker.AA variant, with the modus operandi of spreading like a way of distributing Conficker.AA
3. Detection Percentage Win32/Agent Year 2010: 3.48%
According to the description of the results of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do that malware is usually going menperbanyak himself then places himself in the temporary folder and add the registry keys that are similar to the malware file or similar to the results files to copy itself at random it was then put yourself in the system folders other operations so that malware can "work" in every time the system start up.
Malware is able to mutate into a series of other threat, its spread through a series of intermediaries that it's almost impossible to remove it only by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable autorun, and that is not less important is, think carefully before you click anything.
4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%
Win32/Conficker.Gen is one variant of Conficker having a similar modus operandi in infecting the victim's computer. Similarly, also exploited the same vulnerability that the vulnerability in Server Service.
5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%
Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically the RPC subsystem and can be entered remotely by an attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web servers to download malicious programs that others using the domain name is not official.
Anda sedang membaca artikel tentang
Last year the Top 5 Threats
Dengan url
http://free3-antivirus.blogspot.com/2011/03/last-year-top-5-threats.html
Anda boleh menyebar luaskannya atau mengcopy paste-nya
Last year the Top 5 Threats
namun jangan lupa untuk meletakkan link
sebagai sumbernya
0 komentar:
Post a Comment