Tuesday, December 6, 2011

SOME LATEST VIRUS NAMES

Name DISCOVERY

Exploit.CVE-2011-3402.Gen 2011 Nov 07
Backdoor.IRCBot.Dorkbot.A 2011 May 15
Backdoor.Lavandos.A 2011 Jan 06
Trojan.Android.Geinimi.A 2011 Jan 03
Java.Trojan.Downloader.OpenConnection. 2010 Nov 12
Java.Backdoor.ReverseBackdoor.A 2010 Nov 12
Win32.Ramnit.G 2010 Oct 28
Trojan.Spy.Ursnif.F 2010 Oct 20
Win32.Worm.Stuxnet.A 2010 Oct 07
Win32.Worm.Prolaco.S 2010 Oct 06
Exploit.CplLnk.Gen 2010 Jul 19
Worm.P2P.Palevo.FP 2010 Jul 09
Win32.Viking.Gen 2010 Jul 07
Win32.Worm.Autorun.UB 2010 Jul 01
Trojan.Spy.ZBot.EPU 2010 Jun 30
Trojan.PWS.OnlineGames.KDLC 2010 Jun 21
Backdoor.MSIL.Bot.A 2010 Jun 14
Backdoor.Bifrose.AAJX 2010 Jun 14
Trojan.Renos.PGZ 2010 Jun 01
Trojan.PWS.OnlineGames.KDKC 2010 May 30

Some More Definitions

Vulnerability scanner

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Rootkit

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.


Trojan horses

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)