Top 10 Computer Malware Programs - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Computer Malware Programs-3 Next

This Trojan pretends to be a normal .wma audio file, albeit one that can only be played after installing a special codec/decoder on Windows systems. If the user runs the file, the attacker can install malware of any kind on the user's system. The infected audio file is mainly distributed via P2P networks.

Research carried out by G Data Security Labs indicates that unclosed security holes in browser plug-ins are very much in fashion with bands of cyber criminals. This distribution concept means that current security holes are far from being the only ones exploited by the perpetrators, as evidenced in the current malware analysis for the month of May 2011. In the previous month alone, four of the top 10 computer malware programs had been targeting Java security holes for which Oracle has been offering an update since March 2010. The German IT security provider also noted another increase in malware that installs adware or tries to lure users to install bogus antivirus programs.

According to estimates by G Data experts, the malware industry has been focusing on Java security holes since the end of last year. This kind of computer malware is already dominating the malware landscape and has recently ousted PDF security holes from the top 10. "Even though an enormous number of program updates are being provided, users should not be fooled into deactivating automatic update functions. Not only does this apply to Java, but it should also apply in general to all browser plug-ins used and all applications installed on the PC," recommends Ralf Benzmüller, head of G Data Security Labs. Users can go to the website to carry out a quick check as to whether they have installed the most up-to-date Java version and all corresponding updates on their computer.

More Slideshows:

The Top Nine Challenges of Growing a Business and How to Tackle Them Once you've got your start-up off the ground, the daunting task of growing your business to the next level must begin.

Help Wanted: Competition for Tech Talent Heats Up In many states, there are more tech jobs than candidates to fill them.

Nine Best Practices for Efficient Database Archiving Archiving can be an effective approach to ILM if you follow these best practices.


Related Topics : Anti-Virus Solutions, DoS Attacks

More Slideshows

infra11-190x128 Five Things to Do Now for Greater Security and Compliance

The perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert. ...  More >>

How to Battle Summer Complacency in Endpoint Security

Here are some tips and tricks to ensure you're ready to start the fall with an effective strategy for monitoring threats and endpoint vulnerabilities. ...  More >>

Seven Steps to Hinder Hackers: Antivirus Just Isn't Enough

Antivirus software is no longer a match for today's threats. Here's what your business needs to stay protected. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.