Archive for August, 2013

XoftSpy logoThe program XoftSpy AntiVirus Pro detects and removes viruses, spyware, and other malware that can lead to identity theft or unauthorized use of personal data.

Internet threats may lead to a different kind of problems for you and your computer. For example, some malicious programs make their way to the confidential information and can find credit card numbers, bank accounts, passwords, logins, etc. Other types of malware can use your PC to send spam or other illegal activities. Still others – lead to system instability, errors, blue screens, etc.

To avoid all this, the solution uses features such as a firewall, blocking dangerous sites, e-mail protection. In addition to this technology Active Protection blocks cyber attacks and annoying pop-up advertising program. In addition, XoftSpy AntiVirus Pro uses advanced scanning mechanisms, frequently updated database, improved search, etc. As a result, the user is in possession of a comprehensive information security system computer. (more…)

G DataMobile viruses are rapidly evolving, and in the first half of 2013, their number an increase of 180 percent 180%.

According to experts of the German anti-virus company G Data, for the first 6 months of this year, it was discovered more than 519 thousand new malicious programs for the Android, while in the second half of 2012, the figure was about 185,000. Daily products G Data detected 2,868 new malware aimed at users of the platform. It is noteworthy that in the first half of last year it was discovered a little more than 29.5 million new threats.

To date, Android is the absolute leader among mobile platforms on the number of targeted malware on it. This is not only the prevalence of gadgets running on the Linux operating system, but also the availability of emerging lately special tools (malware kit), with which the creation of malware under the force of even the most experienced users. Moreover, the virus writers are more often disguise malicious code in applications, which makes the analysis of such software. As a result, an infected attachment remains active for a long time on the device and can be used by hackers in their own selfish purposes. (more…)

Google“Google Cloud Storage service is now automatically and free of charge encrypts all user data,” – said in the Internet company Google.

According to Dave Barth (the product manager for Google Cloud Storage), embedded encryption process is completely transparent to users and does not affect the performance of the service.

“If you enable encryption of your data, this feature saves you from using third-party solutions for data encryption, as well as the need for storage and management of cryptographic keys,” – he said.

According to him, when you turn on encryption for new downloadable service files will be encrypted at the back end, and users will not see any differences between the files with crypto support without it. In a blog post Google said that such an approach – is only part of the company’s efforts to strengthen the privacy of customer data after recent scandals with Internet wiretapping and NSA leaks from the U.S.. (more…)

New Vulnerabilities

New Vulnerabilities

Several newly discovered vulnerabilities:

– In the Linux kernel detected vulnerability that allowed a local attacker to elevate their privileges in the system through the transfer of incorrect parameters through a system call perf_event_open (). The problem occurs only on a platform of ARM;

– In the implementation of the CIFS file system of the Linux kernel vulnerabilities detected, allowing one to write an extra byte in the allocated memory area and trigger a kernel crash when mounting external DFS-section. The problem manifests itself when building the kernel with options CONFIG_CIFS and CONFIG_CIFS_DFS_UPCALL;

– In the staffing component of upload files of the management system TYPO3 web-content found vulnerability that allowed to write a file in an arbitrary directory server in the plant hierarchy TYPO3. Using the vulnerability authenticated user with limited privileges can edit the download php-file in the directory that are allowed to run php-code and run it in the context of the current site. This issue is addressed in issues of TYPO3 6.0.8 and 6.1.3; (more…)

AviraAvira Free Android Security 2.0 – now with the functions of scanning and removing viruses

After a successful beta test, Avira announced the official release of an update Avira Free Android Security 2.0. Now the free app to block unauthorized access to mobile Android devices adds to the functions of the remote lock and erase capabilities of a comprehensive scan and remove viruses. Avira Free Android Security 2.0 supports smartphones and tablets running Android 2.2 and above.

“Avira has developed an application that combines the physical security of mobile devices and virtual security of the data on it,” – said Leon Crutchley, manager of mobile products Avira. The reports sounded company says that nearly 700,000 apps available in the online store Google Play Store, contain malicious code. When installing any software Avira Free Android Security 2.0 performs a check using their own anti-virus scanning engine – the owner of specialized awards. This is to prevent the installation of unwanted components in the operating system, tablet or smartphone. (more…)

BitDefender LogoBitdefender Total Security 2014

If you’re looking for a program with “Total Security” for your computer, expect Bitdefender to stand up to your expectations with all the new features and performance boosters added in the new 2014 version. Bitdefender Total Security 2014 will not disappoint you in any way when it comes to offering antivirus protection, firewall, browsing and the social networking protection.

At first sight, this virus protection software hardly looks different from its less feature-rich predecessor products. But the latest edition offers much more than just protection from malware and anti-virus threats. You’ll experience new performance technology, improved reporting, user-friendly interface, an excellent password manager, quick installation, more perfect spam detection and much more. (more…)

Symantec CorpSymantec reported the detection of an attack on a popular hosting “Freedom Hosting”, which provides anonymous hosting service through a network of Tor. On the page of the service have been detected malicious scripts that allow attackers to intercept user data network Tor. As a result, questioned the anonymity of the hosting center – in fact with the help of malicious programs can track the user’s location.

August 4 at the sites hosted on hosting Freedom Hosting, allows access through a network of Tor, were found malicious scripts. Discovered scripts use the vulnerability, found in the browser Firefox, which has already been fixed in Firefox 22 and Firefox 17.0.7 ESR (Extended Support Release). Most likely, this vulnerability has been chosen because it set to work with a network of Tor Browser Bundle (TBB) is based on the Firefox ESR 17. Symantec products are defined these scripts as Trojan.Malscript! Html. (more…)

Malware Trojan HorseDesktop variants of Linux users is relatively rare victims of malicious software, but the company RSA said that discovered a Trojan software is oriented on users of open operating system in desktop form.

According to the blog RSA, a new ‘Trojan Hand’ of Thief works similar to many Windows-Trojans – after installation on the target system it captures data from web forms, even if they are passed by HTTPS, provides access to the back doors and trying to impede or block the the work of antivirus software on your computer.

RSA also notes that found at several sites hacking attempts ‘Hand of Thief’ sales for 2000 dollars, and the code sellers offer technical support for the work of the Trojan, as well as a subscription to update it. $ 3,000 is available to a set of code ‘Hand of Thief’ and the system is web-injection. The blog RSA said that the price of Linux-Trojan broadly in line with prices of similar Windows-development, although the users’ base of the desktop Linux is much smaller. (more…)

HackersCyber ​​criminals are increasingly turning to the services of the Panamanian service Perfect Money.

Three months later, after a group of international human rights organizations raided the office of the electronic payment system Liberty Reserve (after the company closed down), cybercriminals, most experts say, are increasingly turning to the services of the service Perfect Money. So, Idan Aharoni, one of the leading specialist EMC, said that this company is increasingly being used for money laundering and concealment of income.

At the request of its customers Aharoni and his team of experts in the field of information security was monitoring the underground forums that used to sell stolen credit cards. (more…)

ESET LogoReleased a new ESET NOD32 Mobile Security for smartphones and tablets based on Android

The company ESET, a leading international developer of antivirus software and an expert in the field of cyber crime and protecting against threats, has introduced a new intelligent solution ESET NOD32 Mobile Security.

The solution allows you to enjoy all the features of mobile Internet technologies – search for information, communicate, work, learn, shop and play games – without having to worry about the threat of viruses, leakage of personal data or fraudulent transactions.

In addition to direct the Anti-Virus solution includes features Antivor, Phishing and Anti-Spam, thereby providing comprehensive protection for mobile devices. (more…)