Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007
LONDON -- Webroot Software, Inc., a leading provider of security software for the consumer, enterprise and SME markets, today announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007, Grand Hall, Olympia, London.
During the month of March, Trojan Downloader Zlob was the most commonly found Trojan worldwide. Some variants of the Trojan are capable of providing a hacker with the ability to remotely control and use the infected computer for malicious purposes. The Trojan disguises itself as a harmless program and is generally distributed as an email attachment. It often silently downloads and installs bogus security programs such as SpywareQuake, SpyFalcon, SpyLocked and WinAntivirusPro, but may install other malware as well.
In Webroot's monthly analysis of the most common forms of malicious attack, conducted by the company's automated spyware research system Phileas, 180search Assistant/Zango is identified as being the most widespread adware. Following closely behind is Hotbar/Zango and Starware Toolbar, an extremely high-level threat, capable of tracking a users' internet surfing habits and delivering information to a third party.
Perfect Keylogger is the most regular System Monitor, a critical threat capable of tracking software used to monitor computer activity. System Monitors range in capabilities and may monitor key strokes; emails; chat room conversations; instant messaging; websites visited; running programs; usernames and passwords. This information is gathered via remote access and stored or sold to a third party for criminal or immoral use.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024