Labels: AT andT, Free Internet
Read more!
I had no option but to talk about the “hottest gadget” – The Apple iphone. Everyone is eagerly waiting to see how the iphone will leave its historical mark after Friday’s launch as there is a lot of hype about this gadget.
The iphone has already shown the market that not just the body or the outward beauty of the handset counts, but what is inside is what is most important.
The all-touch-screen device, which lacks a button keyboard, will force users to get accustomed to typing messages on a virtual keyboard instead of regular buttons. The gadget triples as a cell-phone, iPod media player and a wireless web device.
There is nobody who doesn’t know about this product which hasn’t been launched yet. While some of them want to be the first to own the Apple iPhone and others fell that apple is packing too much into a phone and do not want to be an early adopter of this untested product!!
Read more!
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.
2. ADW_CNSMIN.G
Malware Type: Adware
This adware arrives on a system via the Internet, or bundled with other applications. It does not have a valid End-User License Agreement (EULA).
It is a plugin that can monitor or manipulate a user's Internet activity by adding itself in the Layered Service Provider (LSP). Like most adware, it generates pop-up avertisements.
3. WORM_NYXEM.E
Malware Type: Worm
This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.
4. TROJ_GENERIC.Z
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans.
5. WORM_ANIG.A
Malware Type: Worm
This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.
6. POSSIBLE_INFOSTL
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known variants of the following spyware:
TSPY_LEGMIR
TSPY_LINEAGE
TSPY_QQPASS
7. HTML_NETSKY.P
Malware Type: HTML
This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.
8. WORM_NETSKY.DAM
Malware Type: Worm
This is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.
9. POSSIBLE_STRAT-2
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known STRATION variants.
10. TROJ_HORST.HF
Malware Type: Trojan
This Trojan usually arrives as a file dropped by other malware or as a file downloaded unknowingly by a user when visiting malicious Web sites.
Labels: Malware, Security, Virus Info
Read more!
- Mobile Game CompetitionEnter your game demo to the Intel® Game Demo Contest 2007. Win Prizes!
Whts the prize to be Won...
Between July 1 and Aug 1, 2007 every vote, combined with judges input, will help determine the 10 finalists in each category. Finalists will upload their demos and compete for $10,000 USD first prizes plus a Gateway computer, Garage Games Torque Game Engine, a full suite of Intel® Software Development Products
Read more!