Feeds

SirCam tops July virus charts

One in 10 PCs have the pox

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

The privacy-threatening, bandwidth-stealing SirCam worm topped the Virus charts in June.

Sircam accounted for a whopping 65.2 per cent of calls to the support centre of antivirus vendor Sophos. It was followed by Magistr (10.4 per cent), last month's chart topper, and Hybris (4.1 per cent).

Sophos found 1276 new viruses during July 2001 but the emergence of SirCam swamped all before it.

Graham Cluley, senior technology consultant at Sophos, expressed concern that such a high-profile virus is still spreading, even to the extent of infecting computers at the FBI's National Infrastructure Protection Centre.

He advised users to update their antiviral protection and apply "safe computing guidelines". In other words don't open suspect attachments, if you want to avoid infection from SirCam.

This is an old message but bears repeating, especially when figures from rival antivirus vendor McAfee are taken into account.

In the last week of July, SirCam had infected 12 per cent of PCs scanned in North America and 11 per cent of European machines checked using McAfee's online scanning service. ®

Top ten viruses reported to Sophos in July


  1. Sircam
  2. Magistr
  3. Hybris
  4. Badtrans
  5. Apology
  6. Kakworm
  7. Keylog Trojan
  8. HHold
  9. Flcss
  10. Qaz


External links

Top ten viruses reported to Sophos in July 2001

Related Stories

SirCam virus hogs connections with spam
Rise in viruses within emails outpacing growth of email
Symantec fails to stop SirCam
Hotmail fails to block SirCam worm
Users haven't learned any lessons from the Love Bug
FBI cyber-brainiacs infect themselves with SirCam
Magistr continues three month reign as top virus

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.