Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Other

Risks that do not meet the definitions of Viruses, Trojan horses, Worms, or other security risk categories, but which may present a risk to a computer and its data, an unwanted nuisance to the user, or exhibit other unexpected results.
Subscribe
NameDiscovered
Bloodhound.ELAM.1002/21/2012
Bloodhound.ELAM.902/21/2012
Bloodhound.ELAM.802/21/2012
Bloodhound.ELAM.702/21/2012
Bloodhound.ELAM.602/21/2012
Bloodhound.ELAM.502/21/2012
Bloodhound.ELAM.402/21/2012
Bloodhound.ELAM.302/21/2012
Bloodhound.ELAM.202/21/2012
Bloodhound.ELAM.102/21/2012
SONAR.RogueAV!gen2108/23/2011
SONAR.RogueAV!gen2008/09/2011
SONAR.RogueAV!gen1906/21/2011
SONAR.RogueAV!gen1806/21/2011
SONAR.RogueAV!gen1706/21/2011
SONAR.RogueAV!gen1606/21/2011
SecurityRisk.OrphanInf04/01/2011
SONAR.RogueAV!gen1503/18/2011
SONAR.RogueAV!gen1403/18/2011
SONAR.RogueAV!gen1303/18/2011
SONAR.RogueAV!gen1203/18/2011
SONAR.RogueAV!gen1103/18/2011
SONAR.RogueAV!gen10
SONAR.RogueAV!gen9
SONAR.RogueAV!gen8
SONAR.RogueAV!gen7
SONAR.RogueAV!gen6
SONAR.RogueAV!gen5
SONAR.RogueAV!gen4
SONAR.RogueAV!gen3
SONAR.RogueAV!gen2
WS.SecurityRisk.412/01/2010
WS.SecurityRisk.312/01/2010
WS.SecurityRisk.212/01/2010
WS.SecurityRisk.112/01/2010
SecurityRisk.Cmdperms05/19/2010
SONAR.RogueAV!gen105/01/2010
SONAR.PDF!gen105/01/2010
SONAR.MaliciousTraffic05/01/2010
SONAR.ProcessHijack05/01/2010
SecurityRisk.Malconfig08/07/2009
WS.Emerging.303/27/2009
WS.Emerging.203/27/2009
WS.Emerging.103/27/2009
WS.SecRiskOther.303/27/2009
WS.SecRiskOther.203/27/2009
WS.SecRiskOther.103/27/2009
WS.Reputation.103/27/2009
Remacc.MultiWebSurv12/19/2007
SecurityRisk.ProxyDns 09/27/2007
SecurityRisk.URLRedir09/27/2007
Tracking Cookie08/16/2006
SecurityRisk.Settec03/02/2006
SecurityRisk.DirectIP01/25/2006
Securityrisk.Proxybar01/25/2006
SecurityRisk.Pacer11/22/2005
SecurityRisk.First4DRM11/08/2005
SecurityRisk.HubSafe11/01/2005
SecurityRisk.Dropper10/19/2005
SecurityRisk.LanHelper10/05/2005
SecurityRisk.MatrixSS06/04/2005
SecurityRisk.LowZones05/11/2005
SecurityRisk.IdleUI03/10/2005
SecurityRisk.QD212/30/2004
Packed.SecurityRiskOff11/15/2004
Packed.SecurityRiskOn11/15/2004
JohntheRipper09/24/2004
SecurityRisk.BrosExt09/03/2004
SecurityRisk.eGatherer08/13/2004
SecurityRisk.IISPriv05/13/2004
SecurityRisk.Downldr01/05/2004
SecurityRisk.ScanToy10/28/2003
SecurityRisk.NavHelper10/20/2003
SecurityRisk.ClubPoker10/16/2003
SecurityRisk.Aports.dr09/25/2003
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
2014 Internet Security Threat Report, Vol 19