Feeds

Viruses up - or down

Take your pick on malware activity figures

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

The Sasser worm dominated virus incident reports last month, according to anti-virus firm Sophos. The prolific worm accounted for over half of the support calls to Sophos in May.

Variants of the NetSky worm occupied positions two to seven in Sophos' monthly chart. NetSky also featured strongly in monthly stats from email filtering company MessageLabs. Carole Theriault, security consultant at Sophos, said Sasser affected many people because it could infect machines without user intervention. The fact it took advantage of a recently-discovered Microsoft vulnerability to spread also further its cause, she added.

Sophos analysed and protected against 959 new viruses in May. This is the highest number of new viruses discovered in a single month since December 2001, according to Sophos. By contrast rival Trend Micro reckons viral activity is on the decrease. Trend says it detected around 1,050 new strains malicious codes (computer worms, viruses, Trojans and other malware) during May, compared to 1,700 new viruses in April 2004. We've asked both companies if they can explain how they've managed to come up with diametrically opposed findings. Trend also reckons NetSky variants and not Sasser - which reached only eighth place in its charts - caused the most problems last month.

For years, anti-virus companies have failed to agree on a consistent scheme for naming viruses so it's perhaps no great surprise they can't agree on numbers either. Confused? You will be when you watch the latest episode of the anti-virus Soap opera. ®

May virus charts by Sophos

  1. Sasser
  2. Netsky-P
  3. Netsky-B
  4. Netsky-D
  5. Netsky-Z
  6. Netsky-Q
  7. Netsky-C
  8. Sober-G
  9. Bagle-AA
  10. Lovgate-V

Related stories

German police arrest Sasser worm suspect
Sasser creates European pandemonium
Sasser worm creates havoc
Netsky tops virus charts by a country mile

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.