BitDefender Ranking First
BitDefender E-threat report in October: two new threats Holzwickede fall detection rates of clicker and AutorunINF, November 10, 2009 what already has announced in the past BitDefender E-threat reports, was confirmed in October. The leading Trojan trio dominant for months clicker, AutorunINF and Wimad is been torn apart. Because Wimad and better known as Conficker, Downadup, have swapped places. While Conficker first reached an infection rate of more than five percent. With Trojan.Swizzor. 6 and Gen:Adware.Heur.wq0@j4oukhei have positioned themselves two newcomers among the nastiest malware threats. The most dangerous E-threat Trojan.Clicker.CM also remains in October. This Trojan is hidden mostly on websites with illegal applications, such as cracks, keygens and serials for commercial software.
He is used by cybercriminals in particular to display advertisements inside the browser. With regard to its detection rate falls this Internet threat but for the first time since may again under the 10 per cent (9,47). Trojan.AutorunInf.Gen is still in second place with 8.54 percent of global infections. This is spread via portable storage devices such as Flash drives, memory cards, USB sticks or external hard drives. For the first time place is Win32.Worm.Downadup with 5.29 percent. Known also as Conficker or Kido, the worm is limited access to Web pages of IT-security providers.
That Conficker is experiencing a renewed upswing, could the faulty security software are particularly on the latest version of the worm,\”installed and so infected computer. (See a free speed test tells you whether or not Conficker is on the computer.) Trojan.Wimad is three to four with 4.90 percent of rank. The threat exploits a Microsoft vulnerability to infect advanced system format(ASF)-Dateien. These are modified so that they download a codec to install other Trojans. PDF JS.Gen followed in fifth place. The exploit takes advantage of Vulnerabilities in the JavScript engine from Adobe’s PDF reader and in this way a malicious code executes in the user’s computer.
Tags: hardware & software, it