Saturday, September 29, 2012

Advanced SystemCare with Antivirus 2013

Advanced SystemCare with Antivirus 2013 - new product from IObit

Advanced SystemCare with Antivirus 2013 - Effective protection against viruses, spyware and malware using two engines (Bitdefender and IObit), as well as a comprehensive optimization of your computer system and Windows.

Adding Bitdefender antivirus technology in Advanced SystemCare adds value to the program that most users will likely welcome. The main advantage is that users only need to install one application to protect your computer from viruses and malicious programs while maintaining an optimized system state.

Mobile Spy: spyware application for the iPhone

Mobile Spy allows you to safely monitor your smartphone

Mobile Spy - Spy software captures SMS, call history, visited websites, photos. Installed and operates in stealth mode, loads the data via GPRS on your special account. If you are concerned and want to control your children or employees, then this program is for you.


Mobile Spy application exists in your phone to complete invisibility and does not manifest itself. The company Retina-X Studios, has developed an application that states that this software can keep track of voice calls, text messages and data from any GPS iPhone, which was installed mobile spy.

Wednesday, September 26, 2012

ZeroAccess brings botnet owners 100,000 dollars a day

ZeroAccess is a very large botnet and there are millions of infections globally


Last week, experts at Sophos have published another study, according to which the latest version of the malware ZeroAccess for the entire period of its existence, more than 9 million infected computers. It is known that the Trojan that allows hackers to gain access to your credit card owners of infected computers, as well as emptying their account in Bitcoin. According to specialists, the number of permanent bots in botnets created by ZeroAccess, about one million computers.

As experts Sophos, at this point, provided that the network will operate at full capacity, botnet owners will receive up to one hundred thousand dollars profit a day.

Thursday, September 20, 2012

Cyber attacks on U.S. banks

Hackers stepped up cyber attacks on U.S. banks


Company Financial services, serving the U.S. banks, brokerages and insurance companies, has warned its customers about possible cyber attacks after an unexpected shutdown of sites JPMorgan Chase and Bank of America, according to Reuters.

Problems with websites of credit institutions began when unknown issued a statement threatening to stop work Bank of America and the New York Stock Exchange. This, according to threaten, they should be the first step in the fight against American corporations. The cause of the "Internet war" ostensibly the film "innocent Muslims." It is unclear whether the shutdown of sites linked banks with threats. Analytical Center Financial services, FS-ISAC, raised the level of cyber threats from “elevated” to "high." FBI spokeswoman declined to comment. At JPMorgan Chase said they worked on the restoration of the site, and Bank of America representative said that most of the customers did not experience difficulty in accessing the site.

Saturday, September 15, 2012

F-Secure Internet Security 2013 - the new protection of home PC

The Company F-Secure has released a new version of its flagship product, F-Secure Internet Security 2013


This application is focused on the consumer market, provides reliable protection of user systems and personal data while working in a global network.

 F-Secure Internet Security - a software package for comprehensive protection of your computer from viruses and hackers. Includes antivirus and firewall, and a module to block access to undesirable sites. F-Secure Internet Security lets you manage all transfers between the computer and the Internet and stop all suspicious packages and do not trust any application that attempts to connect to the Internet. In F-Secure Internet Security technology is used F-Secure DeepGuard to detect newly emerging and previously unknown threats. DeepGuard it manages the entire software in real-time!

Friday, September 14, 2012

Botnet operators remain anonymous with Tor anonymizer


 Experts of the company G-Data found botnet command nodes which were hidden by anonymizer Tor

Owners of the botnet consisting of computers running the operating system Windows, disguised its C&C server that is hidden within the network service Tor. C&C server to use to connect to the IRC bots normal protocol.

According to experts, botnet owners switched to P2P architecture for the last several years, gradually abandoning the use of centralized C&C servers. The use of P2P technology allows individual computers to the botnet send commands to other computers in the network. However, this architecture also has significant drawbacks, as it allows competitors or professionals working in state agencies to seize control of the botnet. Of course, this can only be done if the botnet is not protected by a complex mechanism of authentication.

Thursday, September 13, 2012

Kaspersky Anti-Virus & Internet Security - How to upgrade to version 2013

Kaspersky Anti-Virus & Internet Security - upgrade to version 2013

We are glad to represent you new Kaspersky Internet Security 2013 with proactive hybrid protection!

Kaspersky Anti-Virus & Internet Security 2013 - immediate response to newly emerging threats, high-quality anti-malware protection, constant monitoring of Internet resources, messages and files, as well as user-friendly and intuitive interface.

Upgrade to 2013 - It's easy!

On this page you will find all the necessary information regarding the transition rules to products version 2013.

Main features of VIPRE Antivirus 2012 and Internet Security 2012

VIPRE Antivirus 2012 and Internet Security 2012

As pointed developers series products VIPRE Antivirus / Internet Security, first of all, represent the minimum necessary and obligatory protection tools.

With these products, you can protect your email from viruses and phishing attacks - the program supports Outlook, Outlook Express, Windows Mail and any other mail clients that use POP3 and SMTP.

VIPRE Antivirus / Internet Security - security systems that do not impair the performance of the system, unlike the old traditional antivirus systems.

Sticky Password Pro 6.0 - Promotion (free license)


Sticky Password Pro 6.0 - a free license


Sticky Password – the only password manager and form filler you´ll need

Sticky Password Pro - a complete password manager. He will give you strong passwords for Web sites, applications, and many more features. Create, organize, and secure storage of strong passwords now conveniently than ever.

Unlike the free version of Sticky Password FREE, Sticky Password Manager

Wednesday, September 12, 2012

VIPRE Antivirus 2012 and VIPRE Internet Security 2012

VIPRE Antivirus 2012 and VIPRE Internet Security 2012: solutions to protect corporate networks from viruses and other online threats

Unlike competing products that are from one version to acquire a lot of new features, products, GFI implement a traditional set of features, but in the most advanced and sophisticated form.


GFI's approach to the development of its enterprise antivirus products definitely deserves attention - the developers took over the old set of features, brought it to perfection, and made as simple as possible to use. Ease of work begins with the installation - the user does not need more than two or three clicks, no reboot is required, and the default settings provide protection immediately after installation and start-up.

Tuesday, September 11, 2012

New software breaks a bunch of keys in Mac OS X

Software tool allows potential hackers Mac OS easily steal a set of keys and passwords


A new software tool allows potential hackers Mac OS easily steal a set of keys and passwords, logging in, and provide restricted applications administrator level access. The software was created Keychaindump Finnish programmer Yuuuso Salonen, who became the author of earlier software firewall Radio Silence for Mac OS X.


A bunch of keys in Mac OS X is a password management system that was created in order to store and get quick access to user login and password of various services. Initially a set of keys with a high degree of protection of internal information. "Passwords are encrypted in a bundle multiple ways. Some of these keys by encrypting a doll - one key encrypts the other" - says Salonen.

Monday, September 10, 2012

Hackers, who created Elderwood Platform, continue to attack

Symantec: Hackers, who created Elderwood Platform, continue to attack medium and large business

Representatives of the anti-virus company in an interview said that Symantec for quite a long time to track activity of the group and was able to establish that at the disposal of the participants is a very large collection of exploits so-called "o-day", that is, programs that attack the vulnerability, which is not publicly was known. Typically, vulnerability "0-day" written or direct organizers of the attack, or the professionals who sell them for big money.

In Symantec said that recently said the hacker group also began to attack and several major Western industrial companies involved in the supply of raw materials and industrial products. In addition, it was found that the hackers used a variety of components, the building blocks of a single unified platform, affectionately called "Elderwood Platform". The components of the platform had previously been involved in several high-profile attacks. The platform is designed so that with it you can quickly design and build exploits "o-day".

Sunday, September 9, 2012

Hackers have not got hold tax returns Romney's


In PWC found no evidence of cyber attacks and data theft U.S. presidential candidate.

The company PricewaterhouseCoopers (PWC) denies hacking hacking and theft of tax returns U.S. presidential candidate Mitt Romney's. As a result of an internal investigation no evidence of cracking was found. It is reported by Computerworld.

"At the moment there is no evidence that our systems have been compromised, or that someone managed to get unauthorized access to documents Romney," - said the representative of PWC Maggie O'Donovan-Bolton .

Cheap G Data Security Software Online

G Data Home & Business Security Products Coupon Codes

G Data Software AG - an innovative and rapidly growing company that makes the software, the main activity of which are solutions in information security.

G Data Security Software On Sale - Save up to 25% discount with latest coupon codes. Save money when you buy Best Antivirus programs for your computer security.

Coupon codes are a great way to save. Here you'll find a variety of discount coupon codes on popular security products. Save up to $58.74 with discount coupon codes at ITsafetynews.blogspot.com

Saturday, September 8, 2012

USB Security - USB drives security solution

USB Security is the ultimate USB drives security solution

USB Disk Security - a program that will provide you with 100% protection from malware and viruses spread via removable media: USB flash drives, memory cards, external hard drives and other storage media connected via USB port.

The program is easy to use, is not demanding on system resources and is classified as "set and forget". Fully compatible with current antivirus software that ensures the greatest protection when using them together.

Friday, September 7, 2012

Market of two-factor authentication

Market of two-factor authentication will actively develop the next 4-5 years

According to analysts, one of the commonly used factor authentication becomes mobile.

According to CNews, analyst firm TechNavio has published a report, according to which from 2011 to 2015, the world market of two-factor authentication will grow annually by 20.8%.

Experts believe that in the near future, the most popular method of two-factor authentication will be to use the phone, SIM-card which will be sewn on a special digital signature. With this SIM card user will be able to carry out legal actions to manage funds through e-banking system, and more. Another variant of this technique is to create a special smart card that will be of an electronic identity card.

Additional components of AVG 2013

Additional components of AVG: available in antivirus products AVG Internet Security 2013, AVG Anti-Virus Pro 2013 and AVG Anti-Virus Free 2013

Additional components of AVG - it features or technology that improves visibility of web pages, system performance, and offer all sorts of helpful advice. Currently used: AVG Accelerator, AVG Advisor, AVG Do Not Track. These components work invisibly in the background, they are not listed on the main screen and usually do not involve a large number of parameters to be adjusted.

They are available in antivirus products AVG Internet Security 2013, AVG Anti-Virus Pro 2013 and AVG Anti-Virus Free 2013.

Bitdefender 2013: Update products to version 16.20.0.1483

September 7, 2012 released new versions Bitdefender 2013 16.20.0.1483

An update for Bitdefender Total Security 2013, Bitdefender Internet Security 2013, Bitdefender Antivirus Plus 2013

The update is available for:


- Bitdefender Total Security 2013;
- Bitdefender Internet Security 2013;
- Bitdefender Antivirus Plus 2013.

AdBlock - the ad blocker for Opera released

New version AdBlock - the ad blocker for Opera

Advertising is the main source of income for many online projects and ad units without built some notable resources simply could not exist.

Most users are willing to put up with this "necessary evil." However, the inhabitants of a global network of experienced severe irritation when annoying pop-ups and banners colorful distractions take up more space than the useful content of the page. Installing the browser-AdBlock extension is one of the simplest and most common way to solve this problem.

"AdBlock - one of the most popular extensions for Chrome and Safari, is now available for users of Opera! With this tool, you can quickly and easily block annoying ads on popular web-pages, including Facebook, Youtube and Hulu ", - informs the developer on the official website of the product.

Thursday, September 6, 2012

AVG releases a new line of anti-virus programs

AVG anti-virus and Internet Security Software 2013


AVG anti-virus company today announced an updated line of its products, saying that new items are fully compatible with Windows 8, support the touch screen, offer rapid scanning system and a new interface. Recall that the AVG product line includes both paid products for business users and small businesses, as well as free home programs.

The most comprehensive and expensive anti-virus package AVG Premium Security 2013 comes with a firewall system predictive scanning hyperlinks on the Internet, anti-spam, anti-spyware and a new system, which protects the user from possible hacking wireless networks. A little less than a full set of Internet Security 2013 has about the same thing, except for the "advanced control systems of privacy."

Wednesday, September 5, 2012

Anonymous Hacks Siemens and Fujitsu Websites

Anonymous Hacks Siemens and Fujitsu Websites in Operation Coltan


 Members of the hacker group Anonymous leaked online data stolen from compromised database of Siemens and Swiss Brazilian unit Fujitsu. Hackers have published a lot of information, in particular names and passwords stolen from databases hosted on the website.

According to experts, according to the information that hackers posted online PrivatePaste, for hacking sites have been re-used vulnerabilities that can embed SQL-code. In addition, it is noted that, based on published data, hackers can not access to highly confidential information. The data allegedly stolen from the site of Siemens, contain non-critical information on the website as well as information on the main site database. Data stolen from the site of Fujitsu, include a short message, an active link, as well as several accounts site administrators and their assistants. All passwords were apparently forced.

Symantec: Norton antivirus 2013

Symantec introduced the updated line of antiviruses "Norton 2013"

The proposed version of the products boast a new interface that is optimized for the operating system Windows 8, as well as an impressive array of new features.

Symantec has announced new versions of the products Norton Anti-Virus 2013, Norton Internet Security 2013 and Norton 360 2013. These popular applications, addressed to ordinary users, provide reliable protection for home computers from a wide range of Internet threats.

Mechanism Scam Insight makes your stay by a global network of extremely safe and warn of potentially dangerous and malicious websites. The necessary information is extracted from the online database Norton Insight Network, which brings in the filling with thousands of community members. In the category of suspicious resources also will include all new sites.

In August 2012 there was a marked intensification of virus-writers and online fraud

The most common malicious program in August was a Trojan Mayachok.1

The company "Doctor Web" provided the virus activity in August this year. Specialists Increasingly developers viruses and online fraud, and a wave of attacks on web-own site, the purpose of which was to spread malware for mobile devices.

Experts note that in August 2012 the most common malicious program Trojan.Mayachok.1. The number of detected instances of Trojan increased by 6.5% compared to July of this year.

Tuesday, September 4, 2012

Potential effectiveness of BlackHole more than 2 times

Exploit for version 7 Java BlackHole increased efficiency up to 25%


After it was reported there in version 7 Java vulnerabilities two zero-day, malware developers package BlackHole turned into a commercial version of its product exploit allowing cyberhawks use these vulnerabilities to their advantage. The researchers note that this exploit has increased the potential effectiveness of BlackHole more than 2 times.

According to specialists Seculert, a good set of exploits like BlackHole, usually has success rate (infected computers in contact with the server, infected BlackHole) about 10%. However, studies have shown that after the integration of the new Java-exploit BlackHole success rate rose to 25%.

DLP - Protection against data loss

Today, many companies are increasingly focuses on the protection of confidential information, however, there is not enough clarity and common understanding of what constitutes a complete DLP-system.

DLP - "Data Loss Prevention" used for products and systems to protect against leaks.

In our view, the term DLP has not become obsolete, and solutions for preventing data leakage will exist for quite some time, be combined with other types of products to secure data and integrated into a global system of this kind.

Fake antivirus for Windows 8

McAfee: In the Internet there was a false antivirus for Windows 8

Antivirus contains rootkit component that creates multiple backup entries in the registry and the system directory Windows.

Despite the fact that before the release of Windows 8 still had to wait more than two months, cyberhawks already begun using the brand. Thus, the anti-virus company McAfee researchers discovered malware authors is positioning its product as antivirus "Windows 8 Security System". The user interface looks like a normal antivirus.

Taiwan - the department "to conduct electronic and Internet wars"

Taiwan will increase the offensive and defensive capabilities of cyberwar

Department of National Defence intends to expand its office communications and information, adding the department "to conduct electronic and Internet wars."

Taiwan government has announced its intention to increase the amount of financial resources available to conduct cyber warfare. Reported by the Taipei Times with reference to documents published by the Ministry of National Defense.

The documents means that the agency intends to expand its office communications and information, adding the department "to conduct electronic and Internet wars."

Monday, September 3, 2012

New version of Trend Micro Deep Security 9

The new version of Trend Micro Deep Security 9 for server protection


Today Trend Micro announced a new version of the platform for the protection of servers, applications and data in physical, virtual and cloud environments - Trend Micro Deep Security 9. The solution enables companies and service providers IaaS ("Infrastructure as a Service") to increase return on investment in virtualization and cloud technologies.

The new version of Deep Security line does not need to install agents on virtual machines and is designed specifically for environments VMware ®. Developers managed to increase performance is achieved and convenience, as well as opportunities to protect the server level public and hybrid cloud environments. That allows you to dynamically handle the load while maintaining a high level of security and ensure regulatory compliance.

FinFisher learned to infect smartphones

FinFisher attacking mobile users


Company "Citizen's Lab" has detected a new spy software for mobile devices. According to company representatives, research has shown that the basis for a new spyware program served FinSpy, supplied software FinFisher, created by Gamma Group UK.

It is reported that this version FinSpy runs on almost any modern mobile devices. The victims of this spyware can be as owners of mobile devices based on Android OS and Windows Phone, and the owners of BlackBerry, and even the happy owners of the iPhone and iPad.

RemoveIT Pro Enterprise Review

RemoveIT Pro Enterprise V7.63 

RemoveIT Pro Enterprise - a small but efficient anti-virus scanner to detect and remove various types of malware from your computer. Additional assistant for your basic antivirus. After RemoveIT Pro has found a virus from your computer will delete all associated with the executable file objects to avoid further contamination.

Program Description

RemoveIT Pro Enterprise detects and removes a variety of new malicious files, including malicious software (Malware), viruses, worms, Trojans, spyware (Spyware) and advertising (Adware), undetectable, the assurance of the developers, and other popular antivirus software.

Oracle knew about the presence of 0-day Java vulnerabilities in April

Security Explorations company said it released Oracle solution does not correct all vulnerabilities in Java

Oracle has released a security alert, which eliminated the zero-day vulnerability in Java (CVE-2012-4681). Recall that last week of the first public exploit this vulnerability reported Atif Mushtaq from the company FireEye. According to experts, hackers used a gap in Java for the implementation of targeted attacks, but in the near future to exploit it was supposed to be accessible to a wide range of cyberhawks.

The next day, the company Rapid 7 said about adding a module to exploit CVE-2012-4681 for a tool to pentesterov Metasploit, and Brian Krebs, citing its own sources, said that his version of the exploit works and authors BlackHole. Quoting one of the leaders of BlackHole, Krebs wrote that the price of such an exploit could be about $ 100,000.

Sunday, September 2, 2012

BitDefender Total Security 2013 Build 2013 16.18.0.1406 Final


August 2, 2012 - release of the BitDefender product line 2013

Updated products: BitDefender Total Security, Bitdefender Internet Security, Bitdefender Antivirus. While the new product is available only in English.

One of the important innovations version Total Security 2013 does become secured browser Safepay, which runs in a secure environment with a virtual keyboard. This browser opens automatically when detects that you are visiting the site of the payment systems, banks and other resources of this kind. Tough protection against interception of keystrokes helps to perform any financial transactions with maximum security.

Facebook will remove the counterfeit mark "Like"

Social network Facebook has decided to proceed with a large-scale clean-up of the fake "Likes."


Facebook began to introduce more stringent measures against spammers and malicious content - the company intends to further develop the marks "Like", removing bogus mark. The company said it will remove all the marks that were generated by automated or suspicious accounts. Typically, counterfeit mark used to promote certain products or bringing attention to the blogs of users.

Simply put, Facebook has launched a program, scrub cheated optimizers ranking points needed to attract increased interest on the part of users. Usually, fake "like" used to promote certain goods, attracting attention to the blog and other actions aimed at promoting a blog or an article in it.

Removing bogus stamps will implement special programs for the calculation of "Likes". In the Facebook note that these measures will improve the quality of content, which is really interesting to users, and tougher action against spammers.

Sale of Samsung Galaxy S III in the U.S.

Apple calls to ban the sale of Samsung Galaxy S III in the U.S.


The list of devices Samsung, in which Apple finds a violation of its patents were added to the latest smartphones

Apple will need to ban sales in the U.S. flagship smartphone South Korean manufacturer Samsung - Galaxy S III. The suit, Apple representatives were sent to the federal court in San Jose on Friday, writes The Wall Street Journal.

Only in the lawsuit are four smartphone Samsung - Galaxy S III and Verizon Galaxy S III, Galaxy Note and Galaxy Note 10.1. Thus, the number of products the South Korean company, which Apple finds a violation of its patents, reached 21. Among them are several versions of the smartphone Samsung Galaxy S II. Consideration of the petition to ban U.S. sales of gadgets Samsung is scheduled for September 20.

Saturday, September 1, 2012

Oracle has released patches for urgent Java 6 and 7

Extraordinary patch for an 0-day vulnerability


Oracle has released extraordinary patch for an 0-day vulnerability, which in recent days have begun to actively exploit some cybercriminal groups.

Updates for JDK and JRE 6 Update 7, JDK and JRE 6 Update 34 contains patches for four vulnerabilities Java, including the notorious CVE-2012-4681. Oracle has emphasized: given the danger of this threat, it is strongly recommended that all users install the patch data as soon as possible.

The vulnerability affects only the desktop version of the plugin Java, working through a web browser, they do not touch the server version or separate Java-applications.

Dr.Web virus database


The advantages of Dr.Web virus database


Dr.Web anti-virus started to be developed in the early nineties of the twentieth century, when the Internet was just developing and was not a "global network", when only few companies could afford access to the global network. In conditions where the traffic had to cost a lot and updated as often as possible, virus database, and thus while it downloads from the Internet, should be minimal. Such was the task for the developer and it was done - until now, the Dr.Web virus database is the smallest of all the anti-virus programs. This is achieved through the development of its own technology to create virus database on the basis of a very flexible language, which was designed to describe the bases. Small virus database saves traffic, the less space on disk after installation and RAM than other database vendors. The small size allows the virus database Dr.Web software components to interact in high speed without causing excessive load on the processor.

Computers Missile Defense Agency turned into a warehouse pornography

 In the media leaked information that the Pentagon issued a secret order prohibiting employees U.S. Missile Defense Agency to view pornographic material on company computers. In respect of employees who violated the order will apply disciplinary measures.

It should be noted that according to the information previously published The Washington Times, the problem is in the U.S. Government has been around for years. As an example, the publication cites the case when, in 2006, he was arrested by Deputy Press Secretary at the Ministry of State Security USA. He was accused of trying to abuse underage girls on the Internet.