yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

Computer Worm Uses Fake FedEx Delivery Notification Emails to Infect PCs, Warns PandaLabs
Fake delivery message takes advantage of holiday shopping season, contains Kuluoz worm and bogus antivirus program

ORLANDO, Fla., Dec. 5, 2012 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, has detected a new campaign that may compromise user security. This new email scam, which coincides with the holiday shopping season, involves a fake FedEx delivery message aimed at tricking users into downloading the Kuluoz.A computer worm and a fake antivirus program called "System Progressive Protection."

The spam message purports to come from FedEx. You can see an example here:

The message contains a link to download a 'receipt' for the user to collect the package that has supposedly been delivered to them. If the user clicks the link, they are taken to a Web page which downloads a .zip file named "Postal Receipt." This file contains an executable file with a Word icon that downloads a variant of the Kuluoz.A worm, which then tries to connect to a remote server to receive commands from attackers and perform several malicious actions on the affected computer, including running files.

Once run, the worm opens the notepad, displaying a blank page to make users believe they are running a legitimate file. In addition, it downloads a fake antivirus program called "System Progressive Protection," which simulates a computer scan. The scan reports a number of infections, and prompts the user to buy the antivirus to remove them. However, this is just a scam aimed at stealing victims' money as none of the reported infections are real, nor is the 'antivirus software.'

A screenshot is available at:

"With the holiday season well underway, cyber-criminals are leveraging this time of the year to spread malicious emails aimed at tricking users and stealing their money," said Luis Corrons, technical director of PandaLabs.

"Once again, cyber-crooks are using social engineering techniques to spread malware," explained Corrons. "Even if users haven't purchased anything and aren't waiting for a delivery, they are curious by nature and keep falling into this type of trap. Holiday seasons like Christmas usually bring an increase in online shopping and present criminals with the opportunity to target a larger than usual number of victims."

PandaLabs advises users against clicking any links included in email messages or running attached files that come from unknown sources. In addition, consumers should have an effective security solution installed capable of detecting both known and new malware strains, like cloud-based Panda Cloud Antivirus, available for free at

About PandaLabs

Since 1990, PandaLabs, Panda Security's malware research laboratory, has been working to detect and classify malware in order to protect consumers and companies against new Internet threats. To do so, PandaLabs uses Collective Intelligence, a cloud-based proprietary system that leverages the knowledge gathered from Panda's user community to automatically detect, analyze and classify the more than 73,000 new malware strains that appear every day. This automated malware classification is complemented through the work of an international team with researchers specialized each in a specific type of malware (viruses, worms, Trojans, spyware and other attacks) to provide global coverage. Get more information about PandaLabs and subscribe to its blog news feed at Follow Panda on Twitter at and Facebook at

SOURCE Panda Security

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers