Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall
The latest flash vulnerabilities are being exploited by tens of thousands of Trojan horses to perform massive attacks on computers. Yesterday, the security manufacturer issued an emergency red (first level) security alert said, "Trojan Group" virus using the latest Flash vulnerability intrusion user computers, and guide tens of thousands of kinds of Trojan virus to attack the computer poisoning. According to the monitoring and measurement, there are more than 3 million computers have been "Trojan group" attacks, poisoned computers will appear anti-virus software is closed, the system time is modified, commonly used procedures are deleted, online network of silver and QQ account password and other passwords stolen and other symptoms.
Rising anti-virus experts said that the system vulnerabilities only threaten a single operating system, browsers and so on. The flash flaw ignores the difference between the operating system and the browser. According to statistics, more than 60% of users currently have this vulnerability.
At present, the domestic mainstream security manufacturers have targeted the launch of the "Trojan cluster virus killing and repair Tools", computer users can download in time to kill.
Computer is "Trojan Group" virus infection after symptoms
1, antivirus software main program can not be opened or opened after no response;
2. Abnormal shutdown of monitoring program;
3, the system date is forced to change;
4, firewall warning, abnormal program Access network;
5, the local area network ARP attack;
6, the virus repeatedly killing is not clean;
7, the desktop shortcut icon into a blank box (this is because the icon points to the exe file was deleted by virus);
8, security software or security monitoring tools can not be used (such as process viewing tools, system optimization tools, etc.);
9. The system registry is constantly being written to hijack.