Top 10 Computer Malware Programs - Slide 2

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Computer Malware Programs-2 Next

This Trojan downloader is contained within manipulated Java applets found on websites. When the applet is downloaded, a URL is generated from the applet parameters, which the downloader uses to upload a malicious executable file onto the user's computer and run it. These kinds of files can be any type of malware. The downloader exploits the CVE-2010-0840 security hole to break out of the Java sandbox and write data to the system.

Research carried out by G Data Security Labs indicates that unclosed security holes in browser plug-ins are very much in fashion with bands of cyber criminals. This distribution concept means that current security holes are far from being the only ones exploited by the perpetrators, as evidenced in the current malware analysis for the month of May 2011. In the previous month alone, four of the top 10 computer malware programs had been targeting Java security holes for which Oracle has been offering an update since March 2010. The German IT security provider also noted another increase in malware that installs adware or tries to lure users to install bogus antivirus programs.

According to estimates by G Data experts, the malware industry has been focusing on Java security holes since the end of last year. This kind of computer malware is already dominating the malware landscape and has recently ousted PDF security holes from the top 10. "Even though an enormous number of program updates are being provided, users should not be fooled into deactivating automatic update functions. Not only does this apply to Java, but it should also apply in general to all browser plug-ins used and all applications installed on the PC," recommends Ralf Benzmüller, head of G Data Security Labs. Users can go to the website www.java.com to carry out a quick check as to whether they have installed the most up-to-date Java version and all corresponding updates on their computer.

More Slideshows:

The Top Nine Challenges of Growing a Business and How to Tackle Them Once you've got your start-up off the ground, the daunting task of growing your business to the next level must begin.

Help Wanted: Competition for Tech Talent Heats Up In many states, there are more tech jobs than candidates to fill them.

Nine Best Practices for Efficient Database Archiving Archiving can be an effective approach to ILM if you follow these best practices.


Related Topics : Anti-Virus Solutions, DoS Attacks

More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations. ...  More >>

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.