Feeds

Viruses up - or down

Take your pick on malware activity figures

  • alert
  • submit to reddit

Protecting against web application threats using SSL

The Sasser worm dominated virus incident reports last month, according to anti-virus firm Sophos. The prolific worm accounted for over half of the support calls to Sophos in May.

Variants of the NetSky worm occupied positions two to seven in Sophos' monthly chart. NetSky also featured strongly in monthly stats from email filtering company MessageLabs. Carole Theriault, security consultant at Sophos, said Sasser affected many people because it could infect machines without user intervention. The fact it took advantage of a recently-discovered Microsoft vulnerability to spread also further its cause, she added.

Sophos analysed and protected against 959 new viruses in May. This is the highest number of new viruses discovered in a single month since December 2001, according to Sophos. By contrast rival Trend Micro reckons viral activity is on the decrease. Trend says it detected around 1,050 new strains malicious codes (computer worms, viruses, Trojans and other malware) during May, compared to 1,700 new viruses in April 2004. We've asked both companies if they can explain how they've managed to come up with diametrically opposed findings. Trend also reckons NetSky variants and not Sasser - which reached only eighth place in its charts - caused the most problems last month.

For years, anti-virus companies have failed to agree on a consistent scheme for naming viruses so it's perhaps no great surprise they can't agree on numbers either. Confused? You will be when you watch the latest episode of the anti-virus Soap opera. ®

May virus charts by Sophos

  1. Sasser
  2. Netsky-P
  3. Netsky-B
  4. Netsky-D
  5. Netsky-Z
  6. Netsky-Q
  7. Netsky-C
  8. Sober-G
  9. Bagle-AA
  10. Lovgate-V

Related stories

German police arrest Sasser worm suspect
Sasser creates European pandemonium
Sasser worm creates havoc
Netsky tops virus charts by a country mile

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.