Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where
the growth of the variants of the threat or the threat of computer
viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat
level of growth in various forms to achieve a high level and almost
dangerous to human life even predicted to trigger a cyber war. Stuxnet
virus, for example, into the SCADA system commonly used in various
infrastructure facilities such as power plant automation systems,
industrial machinery, and so forth. In
fact, Stuxnet also infiltrate into the office of Iran's nuclear
facilities and potentially a small mistake can trigger a nuclear hazard.The
following are the top 10 malware roaming in Indonesia and the world of
cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After
Conficker.AA successfully, the sending computer will perform remote
control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE
is a worm which is also a variant of Conficker.AA, the modus operandi
resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According
to the description of the detection of malware ESET NOD32 is a generic
malware, known among the family of malware with the user's ability to
steal data from infected PCs. To
do this malware is usually going menperbanyak he then put himself in
the temporary folder and add the keys in the registry similar to the
malware file or files similar to the copy itself that was random and put
yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The
malware is capable of mutating into a series of other threat, spread
through a series of intermediaries that it's almost impossible to remove
it just by using one way only. To
prevent this, use a good security device with a complete anti-malware,
do not forget to always patch, disable Autorun, and no less importantly,
think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat
this one is a computer worm that attacks the tissue and spread by
exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat
is able to make contact with the web server to download malicious
programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because
of the risk posed was not large, most cases can be handled Win32/VB by
the user by using antivirus or security device to stop the movement in
corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection
results are also used to analyze a series of malware that uses the file
autorun.inf as a way to enter and infect personal computers. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk) and other similar devices
accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB
also has another name, namely: Downloader.Agent.LZM,
Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe,
W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet
is one type of malware with a specific target (targeted malware) that
is quite popular in the year 2010 as the target on automation SCADA
systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection
of INF / Autorun.Gen used to describe a series of malware that uses the
autorun file as a way to confirm the computer-which successfully
attacked the target PC. The
file contains information on programs developed for rυn be able to do
when the device moves (eg, USB flash disk and other similar devices
accessed by users who use Windows-based PC.
Tidak ada komentar:
Posting Komentar