LATEST VIRUS NAME..

    1.     Virus Name:     Virus:W32/Sality
   A malicious program that secretly integrates itself into program or datafiles.It spreads by integrating itself into more files each time the host program is run.
              
    2.     Virus Name:           Trojan-Downloader:W32/Hiloti
                   This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    3.     Virus Name:  Trojan-Downloader:W32/Fakerean.gen!A

This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    4.     Virus Name:  Trojan-Downloader:W32/Wimad.gen!A
     A trojan that secretly downloads malicious files from a remote server, then installs and executes the files.
              
    5.     Virus Name:           Trojan-Downloader:W32/Oficla
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    6.     Virus Name:           Trojan:AndroidOS/Tapsnake
 Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    7.     Virus Name:           Email-Worm:W32/Bagle.GE
  This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.
              
    8.     Virus Name:           Virus:W32/Bursted
A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into  more files each time the host program is run.
              
    9.     Virus Name:           Trojan:W32/Qhost
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    10.     Virus Name:           Trojan:W32/Agent.DKJC
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.  

0 comments: