NetWorkControl
It is a fake antivirus program which warns users that their computer is unprotected. It blocks the computer until users activate the false program It can reach the computer... Thanks to Collective...
View ArticleMS10-047
It is a group of important vulnerabilities in Windows Kernel on Windows 2008/7/Vista/XP computers, which allows hackers to gain local privilege escalation and to launch denial of service... Thanks to...
View ArticleMS10-048
It is a group of important vulnerabilities in the Windows Kernel-Mode Drivers on Windows 2008/7/Vista/2003/XP computers, which allows hackers to gain local privilege escalation and to... Thanks to...
View ArticleMS10-049
It is a group of critical vulnerabilities in the SChannel on Windows 2008/7/Vista/2003/XP, which allows hackers to gain remote control of the affected computer with the same privileges... Thanks to...
View ArticleMS10-050
It is an important vulnerability in different versions of Movie Maker on Windows Vista/XP computers, which allows hackers to gain remote control of the affected computer with the same privileges as......
View ArticleMS10-051
It is a critical vulnerability in XML Core Services, which allows hackers to gain remote control of the affected computer with the same privileges as the logged on user. Thanks to Collective...
View ArticleMS10-052
It is a critical vulnerability in MPEG Layer-3 codecs on Windows 2003/XP computers, which allows hackers to gain remote control of the affected computer with the same privileges as the logged on......
View ArticleMS10-053
It is a group of critical vulnerabilities in Internet Explorer versions 6 on Windows 2003/XP computers, 7 on Windows 2008/Vista/2003/XP and 8 on Windows 7/2008/Vista/2003/XP, which allows hackers to......
View ArticleMS10-054
It is a group of critical vulnerabilities in SMB protocol on Windows 2008/7/Vista/2003/XP, which allows hackers to gain remote control of the affected computer with the same... Thanks to Collective...
View ArticleMS10-055
It is a critical vulnerability in the Cinepak codec on Windows 7/Vista/XP computers, which allows hackers to gain remote control of the affected computer with the same privileges as... Thanks to...
View ArticleMS10-056
It is a group of critical vulnerabilities in certain versions of Office Word, which allows hackers to gain remote control of the affected computer with the same privileges as the logged-on user. Thanks...
View ArticleMS10-057
It is an important vulnerability in certain versions of Excel, which allows hackers to gain remote control of the affected computer with the same privileges as the logged-on user. Thanks to Collective...
View ArticleMS10-058
It is a group of important vulnerabilities in TCP/IP on Windows 2008/7/Vista computers, which allows hackers to gain local privilege escalation and to launch denial of service attacks. Thanks to...
View ArticleMS10-059
It is a group of important vulnerabilities in the Tracing Feature for Services on Windows 2008/7/Vista computers, which allows hackers to gain local privilege escalation. Thanks to Collective...
View ArticleMS10-060
It is a group of critical vulnerabilities in the .NET Common Language Runtime and in Silverlight, which allows hackers to gain remote control of the affected computer with the same privileges as......
View ArticleTapSnake.A
It affects mobile phones with an Android operating system. It seems to be the classic game for phones called the Snake, but besides the game, it installs a spyware program which requires...
View ArticleSecurityTool2010
It is a fake antivirus program which deceives users and warns them of unexisting threats in their computers. It can reach the computer when the user accesses certain websites which... Thanks to...
View ArticlePeakProtection2010
It is a fake antivirus program which deceives users and warns them of unexisting threats in their computers. It can reach the computer when the user accesses certain websites which... Thanks to...
View ArticleClippo.A
It prevents users from opening Office files (Word, Excel, PowerPoint, Outlook), as it puts a password in order to access them. It spreads through the folders of the system, the mapped and... Thanks to...
View ArticleBanbra.GUC
It is designed to steal users' confidential information related to certain Brazilian banking entities and other web services, like Hotmail. It is distributed via email messages using the news... Thanks...
View ArticleRedCrossAntivirus
It is a fake antivirus program which deceives users and warns them of unexisting threats in their computers. It can reach the computer when the user accesses certain websites which... Thanks to...
View ArticleDNSChanger.ALZ
It modifies the domain name system( DNS) in order to redirect users to a false website, from which malware can be downloaded to the computer. It does not spread automatically using its own means....
View ArticleRansom.AB
It is designed to blackmail users, by blocking the computer and by asking $12 for some code to unblock it. It does not spread automatically using its own means. Thanks to Collective Intelligence,...
View ArticleVisal.A
It reduces the protection level of the affected computer, preventing the execution of many processes and services related to computer security. It attempts to download several applications in order......
View ArticleMS10-061
It is a critical vulnerability in the Windows Print Spooler service on Windows 2008/7/Vista/2003/XP computers, which allows hackers to gain remote control of the affected computer with the same......
View ArticleMS10-062
It is a critical vulnerability in MPEG-4 codec on Windows 2008/Vista/2003/XP computers, which allows hackers to gain remote control of the affected computer with the same privileges as the... Thanks to...
View ArticleMS10-063
It is a critical vulnerability in Unicode Scripts Processor on certain Windows and Office versions, which allows hackers to gain remote control of the affected computer with the same... Thanks to...
View ArticleMS10-064
It is a critical vulnerability in Office Outlook, which allows hackers to gain remote control of the affected computer with the same privileges as the logged on user. Thanks to Collective Intelligence,...
View Article