Artikan Dalam Bahasa Anda

27 Mei 2012

TEN VIRUS DANGEROUS IN THE WORLD

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.

Top 10 Dangerous Computer Virus Barrier in the World and Indonesia in the last year. Where the growth of the variants of the threat or the threat of computer viruses and the like are increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This is the cause of the increased activity associated with the virtual world.Threat level of growth in various forms to achieve a high level and almost dangerous to human life even predicted to trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small mistake can trigger a nuclear hazard.The following are the top 10 malware roaming in Indonesia and the world of cyberspace successfully detected by ESET Threat Sense Lab. Perhaps one of them infect our computers.A. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%Win32/Conficker.AA is a worm that spreads via shared folders and mobile media devices. The worm gets into your computer by exploiting a vulnerability in the Server Service. After Conficker.AA successfully, the sending computer will perform remote control of a victim's computer has been infected and to download.2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%Win32/Conficker.AE is a worm which is also a variant of Conficker.AA, the modus operandi resembles spread dissemination Conficker.AA3. Detection Percentage Win32/Agent Year 2010: 3.48%According to the description of the detection of malware ESET NOD32 is a generic malware, known among the family of malware with the user's ability to steal data from infected PCs. To do this malware is usually going menperbanyak he then put himself in the temporary folder and add the keys in the registry similar to the malware file or files similar to the copy itself that was random and put yourself in the system folders other operations so that malware can work? at any time the system is doing ѕtаrt up.The malware is capable of mutating into a series of other threat, spread through a series of intermediaries that it's almost impossible to remove it just by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable Autorun, and no less importantly, think carefully before you click on something.4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%Win32/Conficker.Gen is one variant of Conficker that has similarities in the modus operandi of infecting the victim's computer. Similarly, the same vulnerability that is exploited vulnerability in Server Service.5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%Threat this one is a computer worm that attacks the tissue and spread by exploiting vulnerabilities in Windows operating system from Microsoft. The specific vulnerability in RPC subsystem and remotely accessible by the attacker. Attackers can launch their attacks without using a valid identity. Threat is able to make contact with the web server to download malicious programs that others using the domain name has not been authorized.6. Detection Percentage Win32/VB Year 2010: 2.74%Worm Win32.VB created with Visual Basic programming language and can spread rapidly, but caused no major problems. Threat is usually working to spread spam. Because of the risk posed was not large, most cases can be handled Win32/VB by the user by using antivirus or security device to stop the movement in corporate gateways. Malware made in the country are including in this type.7. INF / Conficker Detection Percentage in 2010: 2.14%INF / Conficker is the autorun.inf file to spread the Conficker worm. Detection results are also used to analyze a series of malware that uses the file autorun.inf as a way to enter and infect personal computers. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk) and other similar devices accessed by users who use Windows-based PC.8. Detection Percentage Win32/Alman.NAB Year 2010: 2.08%Virus that infects files. EXE, and spread through the media that are used together in a computer network. When the virus reactivates, the virus will download other malicious programs. This virus is also a rootkit. The virus will hide both the process and the files associated with the virus. Win32/Alman.NAB also has another name, namely: Downloader.Agent.LZM, Trojan.DL.Agent.UJE, Virus: W32/Alman.B, W32/Almanahe, W32/QQPass.ADW.worm, W32/Rectix.A9. Detection Percentage Win32/Stuxnet.A Year 2010: 2.02%Win32/Stuxnet.A is a worm that spread widely through the media moves. The modus operandi of this worm spread by exploiting vulnerabilities in computer operating systems from a target of attack. Vulnerability that is utilized in CVE-2010-2568. Stuxnet is one type of malware with a specific target (targeted malware) that is quite popular in the year 2010 as the target on automation SCADA systems are widely used in industry.10. INF / Autorun.gen Detection Percentage in 2010: 1.91%Detection of INF / Autorun.Gen used to describe a series of malware that uses the autorun file as a way to confirm the computer-which successfully attacked the target PC. The file contains information on programs developed for rυn be able to do when the device moves (eg, USB flash disk and other similar devices accessed by users who use Windows-based PC.





















Tidak ada komentar: