Sunday, October 19, 2014
The security fixes are currently not available.
Independent security researchers have found that the popular free Centreon monitoring system was vulnerable to hacker attacks over the past few years.
Since 2008, versions 2.0 through 2.5.2 inclusive are two holes that allow, among other things, to execute arbitrary code on the target system. In this case, for a successful attack will not have to go through the authentication process.
Sunday, July 13, 2014
Trusteer Rapport easy and reliable way to ensure financial security during online transactions on the Internet.
Solution protects against intruders connect to your Internet bank sites or online payments. Rapport is recommended as an additional level of security to any anti-virus or security software is already being used on your computer.
Tuesday, July 1, 2014
The Ultimate Antivirus for Android, STOPzilla Mobile AntiVirus features antivirus and antimalware protection, intelligent anti-theft security, immediate install scanning, event viewer, internet security, on-demand scanning and application audit.
Limited Time Offer - 1 Year Subscription: $9.95
Reg. Price $19.95
Thursday, April 17, 2014
The winners of the next research AV-Comparatives steel programs Emsisoft Anti-Malware 8.1 and Kaspersky Internet Security 2014, the two managed to block 99.7% of threats and does not give any false positives.
Antivirus AVIRA Internet Security 14.0 got third place because 7 false positives, and usually reliable application Bitdefender Internet Security 2014 has dropped to fourth place ranking.
At this time the company released a record 104 fixes for the whole range of supported its products. As described in the Oracle, the last set of Critical Patch Update includes fixes for middleware software, databases, as well as products Hyperion, Siebel, PeopleSoft, and a number of products, the company previously owned by Sun Microsystems, such as Java and MySQL.
Issue covers many patches that eliminate problems such as incorrect privileges in products unauthorized disclosure, remote code execution, and others. Several patches have been released by Oracle marked as critical and have ten ( highest ) level of threat on the scale of Oracle.
Sunday, January 19, 2014
Despite the extension of the release of updates, the program can no longer be downloaded since April this year.
Microsoft has announced its intention to extend the release of updates for its antivirus solutions Security Essentials for Windows XP until April 15, 2015. We remind you that the company will discontinue support for the Windows XP after April 8 this year.
Wednesday, November 20, 2013
MCAFEE LABS SEES NEW THREATS SUBVERTING DIGITAL SIGNATURE VALIDATION
Third Quarter Threats Report Identifies Android Malware That Bypasses App Validation as Signed PC Malware Continues to Surge; Bitcoin Popular in Illicit Trade and Cybercrime
SANTA CLARA, Calif. – Nov. 20, 2013 – McAfee Labs today released the McAfee Labs Threats Report:Third Quarter 2013, which found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50 percent to more than 1.5 million samples. Less surprising but no less daunting was a 125 percent increase in spam.
“The efforts to bypass code validation on mobile devices, and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely,” said Vincent Weafer, senior vice president of McAfee Labs. “The industry must work harder to ensure the integrity of this digital trust infrastructure given these technologies are becoming even more pervasive in every aspect of our daily lives.”
Wednesday, November 13, 2013
The attacks are not focused on specific sectors, and evenly distributed around the world. This indicates that cyber criminals have diversified their victims.
Hardest-hit were the United States of America - 23 % of all attacks were recorded there. In second place Brazil with 16% of attacks, and closes the top three leaders of Japan, with 12% of security incidents.
Tuesday, November 12, 2013
The company F-Secure Labs, dedicated to security issues , published a report for the third quarter of 2013 on threats to mobile platforms. According to a document from July to September, it was discovered 259 new families of malicious software and versions of existing viruses. 252 of them are created for the Android platform, and only 7 - for Symbian. Note that in the second quarter, the number of new families of malware has reached 205.
Most of the detected threats ( 88%) - Trojan Horses, 2.7% - Trojans, spyware, trojans 1.6% of downloaders. 2.3 % was contributed by malicious applications, 1.9 % - the share of instruments to monitor, at 0.4 % - on the exploits, tools for hacking, trojan droppers and spyware.
In addition, in July of this year, he discovered a new set of tools Androrat APK, simplifying the process of introducing malicious code into legitimate Android - application. According to the report , increasing not only the number of malware for mobile platforms - malware is constantly being improved and become more complicated. For example, every fifth threat - it's a bot.
Thursday, October 24, 2013
Since the end of September 2013 has attracted the attention of experts already known malware Nymaim - Trojan with the functions of the blackmailer. Earlier this software infection carried by a known set of attackers exploit - BlackHole, which are used on the computer are vulnerable application or operating system to deliver malicious code. However, recently it was reported that the author of BlackHole kit was detained in Russia. It seems that in this context, hackers have begun using a new way to infect users .
Since the end of September, it was recorded a large number of detections of this malware downloaded using the file browser. The experts found that referral links that lead to the download of malicious files that belong to Google. This means that before infecting the user has entered in a Google-search query and clicks on one of the links in the search results.
According to the survey web pages that initiated the download of malicious code for large-scale contamination attackers used a so-called "Dark search engine optimization" (Black Hat SEO), which is promoted by a specially crafted malicious page in the top issue on popular keywords.