1. /
  2. Security Response/
  3. Ameaças
  • Compartilhar

Security Response

Nossos centros de pesquisa em segurança no mundo inteiro fornecem análise incomparável das ameaças à segurança da TI, que incluem malware, riscos à segurança, vulnerabilidades e spam, e também proteção contra essas ameaças.

Ameaças

Informações atualizadas e precisas sobre as últimas ameaças. Uma ameaça é um aplicativo com o potencial para causar danos a um sistema na forma de destruição, divulgação, modificação de dados e/ou DoS (negação de serviço).
Assinar
GravidadeNomeTipoProtegido*
Infostealer.ObatorTrojan24/04/2015
Downloader.ObatorTrojan24/04/2015
Trojan.SysridgeTrojan24/04/2015
Trojan.DoscorTrojan24/04/2015
W32.Ransomlock.AO!gen1Virus24/04/2015
W32.Ransomlock.AO!inf2Virus24/04/2015
Exp.CVE-2015-1701Trojan23/04/2015
Downloader.Ponik!gen13Trojan23/04/2015
Backdoor.DarpapoxTrojan22/04/2015
Linux.SusiribotTrojan, Worm22/04/2015
Trojan.Ransomcrypt.STrojan22/04/2015
Downloader.Dromedan!gmTrojan21/04/2015
Backdoor.MemsylTrojan22/04/2015
SONAR.LowSec!gen4Trojan, Virus, Worm20/04/2015
SONAR.Ponik!gen4Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen16Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen17Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen18Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen303Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen313Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen347Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen348Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen395Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen397Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen414Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen426Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen429Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen432Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen452Trojan, Virus20/04/2015
SONAR.SuspSystRunTrojan, Virus, Worm20/04/2015
SONAR.Upatre!gen1Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen583Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen585Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen578Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen573Trojan, Virus, Worm20/04/2015
SONAR.SuspBeh!gen483Trojan, Virus20/04/2015
SONAR.SuspBeh!gen526Trojan, Virus20/04/2015
SONAR.SuspBeh!gen570Trojan, Virus20/04/2015
SONAR.SuspBeh!gen530Trojan, Virus20/04/2015
Infostealer.PospunkTrojan18/04/2015
Infostealer.Pospunk!gmTrojan18/04/2015
Bloodhound.RTF.4Trojan17/04/2015
Infostealer.GocotoyaTrojan17/04/2015
Trojan.Cryptdef!gen12Trojan16/04/2015
Backdoor.AlienspyTrojan16/04/2015
Backdoor.GhopapoxTrojan15/04/2015
Trojan.Ransomlock!g84Trojan16/04/2015
Backdoor.NetegolTrojan14/04/2015
Infostealer.SpasipTrojan14/04/2015
Infostealer.FightposTrojan15/04/2015
W32.Lecna.EWorm13/04/2015
W32.MewseiVirus13/04/2015
W32.Mewsei!infVirus13/04/2015
Trojan.Cryptolocker.QTrojan12/04/2015
Trojan.Swifi!gen3Trojan11/04/2015
Infostealer.ProgsilogTrojan11/04/2015
Infostealer.Steem!gmTrojan11/04/2015
Linux.ShelockWorm09/04/2015
Trojan.Cryptdef!gen11Trojan10/04/2015
Trojan.Jectin!gmTrojan10/04/2015
Trojan.JectinTrojan10/04/2015
Backdoor.DrivdropTrojan08/04/2015
Trojan.Cryptolocker.PTrojan05/04/2015
Infostealer.Tiqueb!g1Trojan04/04/2015
Infostealer.Staem!gmTrojan02/04/2015
Infostealer.TeskilogTrojan02/04/2015
Infostealer.TiquebouTrojan02/04/2015
Infostealer.StaemTrojan02/04/2015
W97M.Downloader.BTrojan01/04/2015
Trojan.Gootkit!sdbTrojan01/04/2015
Trojan.Cryptolock!g10Trojan01/04/2015
Backdoor.WeecnawTrojan01/04/2015
W32.DompieWorm31/03/2015
Infostealer.ChabibaseTrojan24/03/2015
Trojan.BisonalTrojan01/04/2015
Trojan.ExplodTrojan30/03/2015
Trojan.PengdoloderTrojan30/03/2015
Trojan.Explod!g1Trojan30/03/2015
Trojan.Explod!g2Trojan30/03/2015
Trojan.Explod!g3Trojan30/03/2015
Downloader.PengdoloderTrojan30/03/2015
Trojan.ParamcudTrojan30/03/2015
*Para manter sua proteção contínua, mantenha sua assinatura da Symantec e/ou licenças sempre atualizadas.