Norton.com
> Viruses & Risks
Viruses & Risks
Our security research centers around the world provide unparalleled analysis of and protection from malware, security risks, vulnerabilities, and spam. If you have any thoughts for how we can improve the content on these pages, please take a moment to provide some
Threat Spotlight: Trojan.Ransomlock
Videos: Tweeting Misleading Apps
Trojan.Nessess | Trojan | 10/03/2013 |
Trojan.FakeAV!gen99 | Trojan | 08/03/2013 |
Trojan.Maljava!gen29 | Trojan | 07/03/2013 |
Boot.Nawpers.B | Trojan | 07/03/2013 |
Trojan.Ransomlock!g44 | Trojan | 06/03/2013 |
Trojan.FakeAV!gen97 | Trojan | 06/03/2013 |
Boot.Nawpers.A | Trojan | 06/03/2013 |
Trojan.Ransomlock!g43 | Trojan | 05/03/2013 |
Trojan.Nawpers | Trojan | 05/03/2013 |
SecShieldFraud!gen12 | Misleading Application | 05/03/2013 |
View all Threats
View all Risks
Internet Threat Meter
Download to your desktop
Security Response Blog
APT1: Q&A on Attacks by the Comment Crew
Symantec Security Response @
Wed, 20 Feb 2013 09:28:02
Today Mandiant released an detailed report dubbed "APT1" which focuses on a prolific cyber espionage campaign ...
New Adobe PDF Zero-day Unleashes Trojan.Swaylib
Symantec Security Response @
Fri, 15 Feb 2013 09:16:55
In a previous blog, Symantec reported on a new Adobe zero-day vulnerability (CVE-2013-0640, CVE-2013-0641) affecting Adobe ...
Trojan.Ransomgerpo Criminal Arrested
Symantec Security Response @
Thu, 14 Feb 2013 23:05:43
Spanish police have reported the arrest of an individual involved with a particular strain of police ...
New Adobe Vulnerabilities Being Exploited in the Wild
Symantec Security Response @
Thu, 14 Feb 2013 19:59:53
Adobe posted a vulnerability report warning that vulnerabilities in Adobe Reader and Acrobat XI (11.0.1) and ...
Man Arrested in Relation to the “Remote Control Virus”
Joji Hamada @
Thu, 14 Feb 2013 08:35:07
Back in October 2012, we published a couple of blogs about Backdoor.Rabasheeta, a back door read ...
Microsoft Patch Tuesday – February 2013
Candid Wueest @
Wed, 13 Feb 2013 05:26:39
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is ...
Threat Spotlight: Trojan.Ransomlock
Trojan.Ransomlock is a detection for Trojan horse programs that lock the desktop of a compromised computer making it unusable.
The threat may arrive on the compromised computer by various means, such as visiting malicious sites, by opening untrusted links or advertisement banners, or by installing software from untrusted sources.
These programs attempt to convince the user to pay money in order to have their computer unlocked and use a variety of different techniques in order to encourage the user to pay the ransom.
More information on Trojan.Ransomlock is available in the Trojan.Ransomlock writeup.
How They Attack
Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.
What is Cybercrime?
How does cybercrime affect people? Check out these real-world examples. To avoid becoming a victim of cybercrime, learn the basics of online protection.
How To Protect
Secure Your Email
Browse the Web Safely
Safeguard Your Instant Messenger
File Sharing Protection
How They Attack
Vulnerabilities
Spyware
Spam
Phishing
Malware
Cybercrime
Tools & Resources
Threat Explorer
24x7 Protection with Norton Products
Virus & Threat Removal Tools
Virus Definitions & Security Updates
Glossary