Posts Tagged ‘F-Secure’

F-Secure logoOf special interest this half year: the increasing use of exploit-based attacks targeted against the Java development platform. Four of five most frequently exploited vulnerabilities are present in Java. Java was the most targeted development platform for exploit attacks during the first half of the year.

Finnish antivirus developer F-Secure has published a report on security threats in the first half of 2013. According to the report, the largest number of cyber attacks over this period has been committed to the platform Java, including their number has steadily increased with the advent of zero-day vulnerabilities. “Four of the five most frequently exploited vulnerabilities found in Java, namely Runtime Environment (JRE) and browser plug-ins” – said the expert F-Secure.

According to the researchers, this is not surprising, since Java is the second after the Windows platform as attractive to hackers, and one of the most common. Analysis of cyber attacks has shown that in 95 % of cases were operated five specific vulnerabilities. The most common attacks were carried out in the United States. For every thousand people are faced with the exploitation of vulnerabilities, 78 in USA, 60 – in Germany. (more…)

F-Secure logoThe company F-Secure has announced a new version of its product line, including Internet Security 2014, Anti-Virus 2014 for PC and MAC and Mobile Security.

According to the company, the beta period for the Internet Security 2014 will last for about 6 weeks and then will go on a normal cycle of product development. This release includes bug fixes found in previous versions, as well as a new user interface for Computer Security, Online Safety and Launch Pad.

Still, the main advantages of the release – effective proactive DeepGuard, web-protection and parental control, robust online banking and safe visiting social networks. Update is designed to fix all the vulnerabilities in the browser, which are used for Internet-based attacks. (more…)

F-Secure logoF-Secure Mobile Security is a premium security suite for your smartphone or tablet.

F-Secure Mobile Security provides complete security for smartphones and tablets Android from malicious applications and Internet threats: malicious and unwanted websites.

The solution also guarantees the integrity of sensitive data in case of loss or theft of the device.

The Parental Control feature allows you to protect your children from inappropriate content on the web pages on the Internet and limit the run specific applications on a smartphone or tablet. (more…)

F-Secure logoF-Secure Internet Security 2014 – a comprehensive anti-virus protection functions the computer against online threats. Includes antivirus, proactive protection, anti-spam and anti-phishing, parental control, secure online banking and web protection against malicious websites.

F-Secure Internet Security 2014 includes applications Computer Security ( Protecting your computer ), and Online Safety ( online security), as well as the launchpad F-Secure Service Agent, which is the central point of access to the components of protection in the form of buttons to run on your desktop computer. (more…)

F-Secure logoF-Secure Anti-Virus 2014 – basic protection against viruses and spyware. You get an easy-to -use antivirus and antispyware protection with proactive DeepGuard against new threats .

F-Secure Antivirus 2014 protects your personal information online. Quick and easy anti-virus software does not interfere with the computer at the time of protection.

Viruses and spyware do not always ask for your permission before you install on your computer. To date, most malware gets onto your computer invisibly – over the Internet. F-Secure Anti-Virus 2014 is a must remedy that provides the necessary security of Windows. (more…)

F-Secure logoDirector of Development at F-Secure, well-known security expert Mikko Hyppönen, explained why the growing popularity cryptocurrency direct impact on the protection of computer systems.

“It is quite a different thing: to protect the organization from cybercrime gang that attacks in order to make money, or targeted attacks to spy for the government – said Mikko Hypponen. – And all this is quite different from protecting your organization against anonymous users, or similar movements, which are not interested in money or espionage, and they want to protest in any way. “

Against every form of threats expected a different defense strategy, and various software tools. (more…)

Twitter hackedImmediately after the two-step authentication on the Twitter site specialists noticed a strange procedure to activate it.

Enough to provide a phone number on the site – and click “OK”. That is not even necessary to enter the code, which came on the phone to confirm the correctness of the introduction of the telephone number. The same procedure applies when removing services.

Sean Sullivan of F-Secure has published an article describing the two-step authentication Twitter vulnerabilities and possible attack scenarios. (more…)

Critical vulnerabilities in routers

New Mac-malware

Information security specialists say the discovered of new malware families previously identified spyware KitM for the operating system Mac OS X.

One of the new code appears to have been written in December 2012 and is intended for users in Germany.

KitM (Kumar in the Mac) is also known as HackBlack and is a kind of backdoor, which makes screenshots and sends them to a remote hacker’s server. It also opens the Shell-access to the infected computer, allowing you to perform different commands on it. (more…)

F-Secure logoF-Secure Online Scanner – free cloud antivirus scanner. In online mode determines whether your computer is infected and, if necessary, cleans the system from the detected threats .

F-Secure Online Scanner detects and removes malware from your computer.

Online scanner helps get rid of viruses and spyware, which can cause problems on your PC, and it works, even if you have another antivirus solution.

F-Secure Online Scanner is an easy-to-use, conduct checks with just a few mouse clicks: just download and run it. Do not leave any traces on your computer. (more…)

F-Secure logoBoth packages exploits are so similar that the operation uses the same vulnerabilities the file and one code.

Experts of the company F-Secure discovered that hackers recently focused on the development of a package of exploits called Cool, which is almost a copy of a known product Blackhole.

Cool package exploit allows attackers to remotely exploit security vulnerabilities and perform drive-by attack. In addition, the researchers noted that in addition to carrying out attacks, Cool also has a set of additional features, including the ability to scan the browser and operating system for potentially vulnerable plugins.

According to employees of F-Secure, a set of exploits designed like the other, is very popular among cybercriminals product – Blackhole. The experts found that both packages use the same exploit to attack targets, a similar technique of infection and how to upgrade. For example, after the elimination of vulnerabilities exploited both products almost simultaneously updated and attack the same vulnerable components of the system.

“Even with all the differences, we can conclude that the Blackhole Cool and more than a little like” – note in the F-Secure. (more…)