20 May Jumcar. From Peru with a focus on Latin America [First part] Jorge Mieres
18 May NoSuchCon 2013 Stefano Ortolani
17 May Malicious PACs and Bitcoins Fabio Assolini
13 May Telecom fraud — phishing and Trojans combined Dong Yan
27 Apr CeCOS VII Michael
Join our blog
You can contribute to our blog if you have +100 points. Comment on articles and blogposts, and other users will rate your comments. You receive points for positive ratings.
The wedding of Kate Middleton and Prince William is by far the most popular topic of conversation today. It’s virtually impossible to look at a newspaper or a blog without seeing some mention of the royal newlyweds. And now we are getting in on the act.
And it’s not because we here at Kaspersky Lab take a major interest in the private lives of the British royals. But spammers obviously do – take a look at the offer we received today:
Yes, fake Swiss watches and iPads are so passé – what you need is a replica of Kate Middleton’s engagement ring, originally given to Lady Diana by William’s father Prince Charles. The spammers claim you now have the chance to “own a piece of British royal history”. This royal family heirloom also comes complete with a “certificate of authenticity”.
Here's the latest of our malware wallpaper calendars.
One of this month's highlighted malware incidents is the Morris worm. This worm was released on 2 November 1988 and by the following day was causing major problems for computers on the Internet. This would be nothing out of the ordinary in today's world. But it certainly was then. The worm quickly infected about 10 per cent of all computers connected to the Internet and, due to a programming error, made them unstable. Of course, in 1988 the Internet was made up of only 6,000 or so computers - it was an esoteric system used almost exclusively by government and academic institutions. So the Internet worm’s time had not yet come. But even so, the Morris worm was one of the first warnings of the importance of applying security patches in a timely fashion.
At the moment we found it, Kaspersky Anti-Virus detected the sample as Heur.Trojan.Win32 . Meanwhile the Jotti multiscanner results were 1/20
2) SEO optimized for all non-Russian Google searchers leading to Rogue AVs, in particular to “XP Anti-Virus 2011” which actually is quite aggressive in blocking Internet access and extorting money for the activation