Thursday, April 17, 2014

Award Winning Antivirus of March from AV-Comparatives

AV-Comparatives - independent laboratory testing of information security - announced the results of its research in March. Test Real-World Protection checked how well the world's top antivirus 1264 fighting modern threats.

The winners of the next research AV-Comparatives steel programs Emsisoft Anti-Malware 8.1 and Kaspersky Internet Security 2014, the two managed to block 99.7% of threats and does not give any false positives.

Antivirus AVIRA Internet Security 14.0 got third place because 7 false positives, and usually reliable application Bitdefender Internet Security 2014 has dropped to fourth place ranking.

Oracle Corporation released 104 patches for its products

Oracle Corporation on Wednesday released its quarterly patch set.

At this time the company released a record 104 fixes for the whole range of supported its products. As described in the Oracle, the last set of Critical Patch Update includes fixes for middleware software, databases, as well as products Hyperion, Siebel, PeopleSoft, and a number of products, the company previously owned by Sun Microsystems, such as Java and MySQL.

Issue covers many patches that eliminate problems such as incorrect privileges in products unauthorized disclosure, remote code execution, and others. Several patches have been released by Oracle marked as critical and have ten ( highest ) level of threat on the scale of Oracle.

Sunday, January 19, 2014

Microsoft extended of the release of the updates for Security Essentials for Windows XP

According to the corporation after April 8 any kind of support of Windows XP, including antivirus solution Microsoft Security Essentials, will stop completely.

Despite the extension of the release of updates, the program can no longer be downloaded since April this year.

Microsoft has announced its intention to extend the release of updates for its antivirus solutions Security Essentials for Windows XP until April 15, 2015. We remind you that the company will discontinue support for the Windows XP after April 8 this year.

Wednesday, November 20, 2013

McAfee Q3 2013 QTR Press Release

MCAFEE LABS SEES NEW THREATS SUBVERTING DIGITAL SIGNATURE VALIDATION

Third Quarter Threats Report Identifies Android Malware That Bypasses App Validation as Signed PC Malware Continues to Surge; Bitcoin Popular in Illicit Trade and Cybercrime

SANTA CLARA, Calif. – Nov. 20, 2013 – McAfee Labs today released the McAfee Labs Threats Report:Third Quarter 2013, which found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50 percent to more than 1.5 million samples. Less surprising but no less daunting was a 125 percent increase in spam.

“The efforts to bypass code validation on mobile devices, and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely,” said Vincent Weafer, senior vice president of McAfee Labs. “The industry must work harder to ensure the integrity of this digital trust infrastructure given these technologies are becoming even more pervasive in every aspect of our daily lives.”

Wednesday, November 13, 2013

Over the past three months were reported 200,000 infections banking Trojans

The malware aimed at stealing banking data , are extremely popular with online fraudsters. In a new report issued by Trend Micro, states that from July to September 2013 there were 200,000 cases of systems of financial institutions - so large spread of banking Trojans have not seen since 2002.

The attacks are not focused on specific sectors, and evenly distributed around the world. This indicates that cyber criminals have diversified their victims.

Hardest-hit were the United States of America - 23 % of all attacks were recorded there. In second place Brazil with 16% of attacks, and closes the top three leaders of Japan, with 12% of security incidents.

Tuesday, November 12, 2013

In the third quarter increased the number of threats to mobile platforms

252 out of 259 new families of malicious software created for the platform Android, and only 7 - for Symbian.

The company F-Secure Labs, dedicated to security issues , published a report for the third quarter of 2013 on threats to mobile platforms. According to a document from July to September, it was discovered 259 new families of malicious software and versions of existing viruses. 252 of them are created for the Android platform, and only 7 - for Symbian. Note that in the second quarter, the number of new families of malware has reached 205.

Most of the detected threats ( 88%) - Trojan Horses, 2.7% - Trojans, spyware, trojans 1.6% of downloaders. 2.3 % was contributed by malicious applications, 1.9 % - the share of instruments to monitor, at 0.4 % - on the exploits, tools for hacking, trojan droppers and spyware.

In addition, in July of this year, he discovered a new set of tools Androrat APK, simplifying the process of introducing malicious code into legitimate Android - application. According to the report , increasing not only the number of malware for mobile platforms - malware is constantly being improved and become more complicated. For example, every fifth threat - it's a bot.

Thursday, October 24, 2013

Trojan - extortionist learned to infect users through the Google search

ESET announced a new method of distribution of Trojan Nymaim, which can block the user's computer in order to demand money for decrypted files.

Since the end of September 2013 has attracted the attention of experts already known malware Nymaim - Trojan with the functions of the blackmailer. Earlier this software infection carried by a known set of attackers exploit - BlackHole, which are used on the computer are vulnerable application or operating system to deliver malicious code. However, recently it was reported that the author of BlackHole kit was detained in Russia. It seems that in this context, hackers have begun using a new way to infect users .

Since the end of September, it was recorded a large number of detections of this malware downloaded using the file browser. The experts found that referral links that lead to the download of malicious files that belong to Google. This means that before infecting the user has entered in a Google-search query and clicks on one of the links in the search results.

According to the survey web pages that initiated the download of malicious code for large-scale contamination attackers used a so-called "Dark search engine optimization" (Black Hat SEO), which is promoted by a specially crafted malicious page in the top issue on popular keywords.

Wednesday, October 23, 2013

Average annual damage from cyber attacks increased by 78 %

The frequency of attacks, the level of their damage and the time to correct them continue to grow the fourth consecutive year, according to the latest report from Ponemon Institute.

In a report in 2013 Cost of Cyber ​​Crime Study estimated that the average annual damage from cyber attacks today is 11.56 million U.S. dollars, an increase of 78 % over four years ago when they released their first report in this series. In addition, over the same four years, the average time required to eliminate the effects of cyber attacks has increased by 130%, and the average cost of removing a single attack amounted to more than U.S. $ 1 million .

Over the past few years, cyber attacks have become much more sophisticated and dangerous. Many hackers around the world joined together in a well-organized and generously sponsored kiberpodpole, whose members actively share their experiences and " best practices." According to the report, an advanced analytics in the security and networking technologies (eg , systems SIEM), including on the basis of big data, help to greatly reduce the threat and the level of spending on the fight against cybercrime.

Tuesday, October 22, 2013

Young people contravene corporate policies governing use of own devices

The study, conducted by Vision Critical, at the request of Fortinet, shows that 51% of employees aged 21 to 32 years rather break the rules of use of personal mobile devices in the office than give up smartphones, digital clocks or tablets.

According to the study, 36% of the 3,200 young employees of companies willing to break corporate security policies for the use of cloud storage, like Dropbox, for work purposes. As for wearable computing solutions, such as Google Glass and clever hours, 48 % are willing to break the rules of safety.

16% of respondents believe that these technologies will soon become widespread in the corporate sector. 33 % believe that once these computing devices become more affordable, they will immediately begin to use for the job. On the other hand, only 8% say these technologies have not become popular.

Friday, October 18, 2013

Kaspersky Lab releases an updated version of Kaspersky Security 8.0 for SharePoint Server

Kaspersky Lab today released an updated version of Kaspersky Security 8.0 for SharePoint Server, which in addition to a number of functional enhancements supports Microsoft SharePoint Server 2013 and improved protection against cyber threats.

Enterprise collaboration solutions greatly simplify the process of solving the daily challenges faced by employees of the companies. However, the documents stored in these systems are being infected with malware, can cause an epidemic throughout the corporate network - which is why these files require special protection . To solve this problem, Kaspersky Lab offers Kaspersky Security 8.0 for SharePoint Server - enterprise solution designed specifically for the protection of IT- infrastructure for joint work in the company.

As part of a renovation solution was integrated support for Microsoft SharePoint Server 2013 , and also added anti-phishing technologies Kaspersky Lab. Now any information contained on the website link to an external source will be checked for legitimacy and locked, if it turns phishing.