Feeds

Slack users blamed for virus longevity

Update a-no-no

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The three month-old Zafi-B worm was the number one virus in August, indicating that to few users are bothering to update their antivirus software.

According to Sophos, the top 10 reported viruses in August have all been in existence for months. The IT security firm notes that the Zafi-B virus continues to wreak havoc on global email.

"Although we have seen a small, 10 per cent decline in reports of Zafi-B since last month, this email-aware worm doesn't look like it's going to fade into obscurity anytime soon," said Carole Theriault, security consultant at Sophos. "Protection against Zafi-B has been available for a couple of months now, and computer users need to get into the habit of updating their systems in a much more timely manner, or this nuisance will continue to dominate reports."

In spite of the arrest of the Netsky virus author, a number of variants are still affecting businesses, and Netsky.P was number two in Sophos's top 10 chart in August.

Rounding off Sophos's top 10 list are four more variants of the Netsky virus, the MyDoom-O, Bagle-AA and Lovgate-V. "Despite more than 1,200 new viruses being detected in August, not one has made it into the chart this month. In fact, the entire top 10 is made up of viruses which have been doing the rounds for weeks, if not months," said Theriault.

August was a particularly bad month for virus attacks. Sophos analysed and protected against 1,230 viruses in the month, which the company says "is the highest number of new viruses seen in one single month since December 2001."

© ENN

Related stories

New Bagle worm drops in and downloads
Meet the Peeping Tom worm
Trojan poses as Berg video footage

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.