Clínica de Hardware

Instalação, manutenção, reparação e assistência técnica a Hardware e Software

Últimos assuntos

» Ponto G em rato de computador
Sab 13 Fev 2010 - 1:08 por Admin

» Ponto G em rato de computador
Sab 13 Fev 2010 - 1:08 por Admin

» Panda Security's weekly report on viruses and intruders
Sex 22 Jan 2010 - 15:11 por Admin

» Estatísticas - Top 5 Browsers em Portugal
Qua 13 Jan 2010 - 17:36 por Admin

» Informe semanal de Panda Security sobre virus e intrusos
Qui 31 Dez 2009 - 16:15 por Admin

» Proteja o computador de prendas indesejadas
Dom 20 Dez 2009 - 2:54 por Admin

» Upgrades a duas máquinas de 32 e 64 bits
Sab 28 Nov 2009 - 2:16 por Admin

» Actualize o seu PC para Windows 7
Qua 18 Nov 2009 - 17:33 por Admin

» Firefox faz 5 anos
Seg 9 Nov 2009 - 17:31 por Admin


Fevereiro 2018


Calendário Calendário

Flux RSS


Top dos mais postadores


Os nossos membros postaram um total de 92 mensagens em 91 assuntos

Temos 1 usuário registrado

O último usuário registrado atende pelo nome de Admin

Quem está conectado

2 usuários online :: Nenhum usuário registrado, Nenhum Invisível e 2 Visitantes


[ Ver toda a lista ]

O recorde de usuários online foi de 9 em Qui 10 Jun 2010 - 0:05


Esqueci minha senha

    Panda Security's weekly report on viruses and intruders


    Mensagens : 93
    Data de inscrição : 02/02/2009
    Localização : Estremadura

    Panda Security's weekly report on viruses and intruders

    Mensagem por Admin em Sex 18 Set 2009 - 13:07

    Virus Alerts, by Panda Security (

    This week's PandaLabs report provides information about a rogue antivirus, a backdoor Trojan and a program for creating Trojans.

    Personal Guard 2009 (see image in Flickr: is a new sample of the infamous rogue antivirus programs. On reaching computers, it runs a spoof hard disk scan. These malicious codes typically display fake infections when running the scan, but Personal Guard 2009 does not show any infections during the first scan. Instead, the file goes hard disk resident and later on displays pop-ups in the toolbar warning about possible malicious items. During the second scan it shows fake viruses.
    From then on it follows the standard procedure; tempting users into buying a fake security program in order to profit directly as well as stealing any data entered by the user.

    WinVNC.A is a backdoor Trojan distributed via email. It uses the subject of swine flu as a lure, and talks about a potential conspiracy of pharmaceutical laboratories, tricking users into opening a PowerPoint presentation ("POS.exe") where "the big secret" is revealed. On running the attached file, the Trojan is downloaded to the computer without the user's knowledge, while the presentation is displayed (see video in
    Flickr: This malicious code is especially designed to steal confidential information from the user and send it to its creator.

    Finally, PassThief.A is a program designed to create password-stealing Trojans (see image in Flickr: The information stolen by the Trojan is sent to an email account specified by the program user. The directory where the Trojan will be installed can be selected, and whether it should run during the first or fourth operating system restart. The Trojan will have the same icon as the task manager and will function on WIN9x/WINME, as it steals the passwords of the pwl files in the operating systems. These pwl files contain passwords for accessing protected resources, session start, phone access to networks, etc.

    More information about these and other malicious codes is available in the Panda Security Encyclopedia

    You can also follow Panda Security's online activity on its Twitter and PandaLabs blog (

      Data/hora atual: Sex 23 Fev 2018 - 6:32