48 per cent of SMBs are infected by worms each year according to a report published by security vendor PandaLabs.

The Second International SMB Security Barometer report (PDF here) surveyed 10,470 companies across Europe, Latin America and North America and found that a third of attacks came from malware capable of spreading via USB.

According to Luis Corrons, Technical Director of PandaLabs, “At present, much of the malware in circulation has been designed to distribute through these devices. Not only does it copy itself to these gadgets, but it also runs automatically when a USB device is connected to a computer, infecting the system practically transparently to the user.”

There are now so many devices on the market that can be connected via USB to a computer: digital cameras, cell phones, MP3 or MP4 players,” added Corrons. “Obviously this is very convenient for users, yet all these devices have memory cards or internal memories and therefore it is very easy for your cell phone, say, to be carrying a virus without your knowledge”.

Panda Security has developed a free product called Panda USB Vaccine which the company says offers a double layer of preventive protection, disabling the AutoRun feature on computers as well as on USB drives and other devices.

More Info:-  www.pcr-online-biz

Explore More

Hacked Information and Proof of Concept @ PlanetCreator.net

“Hacking” In this category, We’re going to post Hacker’s proof-of-concept. Unless you know how to hack, you can not defend yourself from hackers. We’ll know how hack hacks and how

Study on the undetectable Server Bifrost 1.2d for the AV

1. Objective Trying to make the Bifrost Server 1.2d which is the latest version of a remote control KSV undetectable to Antivirus Software Required —– description ———————————————————————— Download Bifrost 1.2dR.AT

Critical SQL Injection (vulnerability) on The New Era Journal http://khitpyaing.org/

PlanetCreator.Net’s Security Team Member has reported another critical SQL Injection (vulnerability) on The New Era Journal http://khitpyaing.org/ These are some information from Vulneral Site http://khitpyaing.org/ : his vulnerability has been