Monday, December 31, 2012

Microsoft warned about vulnerabilities in Internet Explorer


Microsoft in the past weekend reported the discovery of a serious vulnerability in the browser Internet Explorer.

According to the corporation, vulnerability affects versions of IE 6, 7 and 8, where the vulnerability is already in operation on the Internet and potential attackers can now use it. The company said that working hard as soon as possible to release a fix.

In addition, the company's engineers have proposed a temporary maneuver, can significantly reduce the likelihood of execution attacks. In a statement from Microsoft on December 29, said the company is aware of cases in targeted attacks on computers using a browser up to version IE8. Newer versions borauzera, including IE9 and 10 is not affected, however, and for these people the company is also preparing an update to fix a potentially dangerous element.

According to several IT companies, hackers have posted an exploit on the site of the American non-partisan organization Council on Foreign Relations in New York and Washington. So, last Friday the company FireEye reported that the site was compromised and the CFR on it a code, which in closed forums has been fixed on December 21. Code itself initiates an attack like drive-by.

Sunday, December 30, 2012

Free Internet Eraser tool removes traces of your stay in the system


Free Internet Eraser app will make your stay in the global network of anonymous and more secure.

This small utility provides timely delete lists of visited web pages and other confidential information about the recent user activity. Moreover, contrary to his telling name, the product is able to dispose of the data stored on the drive after work with desktop applications.

All available tools and functions are grouped in one window and organized by category. In the tab 'Main', for example, users can perform instantaneous clearance and adjust various common application settings. From this we can provide automatic restart or shutdown your PC after deleting data or stop the current tasks.

Tab 'Windows' help eliminate traces of user system. At the request of the owner of the computer Free Internet Eraser deletes lists of recently viewed documents or media files, the results of search queries, clipboard contents and baskets 'Recycle Bin' etc. And the options available in the tab 'Browsers', will clear the browser cache, delete items «cookies», information about users access and manually entered the URL.

Friday, December 28, 2012

Anvi Rescue Disk 1.0 provides protection against malicious applications 'ransomware'


Company Anvisoft, renowned manufacturer of protection, has released a new product called Anvi Rescue Disk 1.0.

Attention is invited to a comfortable boot environment based CDlinux distribution and desktop environment Xfce, which ensures rapid detection of malicious applications 'ransomware' and ensure their removal from the hard disk.

The term 'Ransomware' the propagation of malicious programs that take the 'hostage' custom computer or stored on it the most important data. For unlocking access to the system, or information to victims of scams offered to pay a certain sum of money. Anvi Rescue Disk will help to solve the problems without unnecessary expenditure. Create bootable media with the proposed tool and use it to boot up your PC. Application will perform a thorough scan of your computer and eliminate the threats detected independently.

In the archive you downloaded from the web RescueDisk.zip (size 106 MB), you will find not only the usual file ISO, designed to 'burn' the optical drive. With utility BootUSB.exe proposed image can be used to create bootable media in any suitable USB-drive.

Monday, December 24, 2012

Symantec announced the new intelligent malware


Symantec today announced new intellectual malicious programs created by hackers to steal information. Under the threat of computers running on OS Windows, and Mac OS, and mobile devices.

Experts report that the virus has the unique ability to spread, in particular, and in the virtual machine, if the respective virtualization software installed on your computer.

There is speculation that it was created by programmers from Italy as a tool for conducting private investigations or espionage, including audio recording and theft of information from address books.

Recently, experts are studying the threats detected OSX.Crisis and highbrow W32.Crisis - virus spyware, simultaneously using a set of vectors of infection and information theft schemes.

Symantec experts believe that this is the first virus to infect guest virtual machines after the infection of the host. Of the functions of theft should be especially noted steal information from social networks Twitter and Facebook, as well as Web-mail service Gmail.

Sunday, December 23, 2012

Mobile Tracking Software 50% discount

Double Subscription Time for Mobile Tracking Software



mSpy Valentine's Day Sales: Double the Subscription Time at Same Price

mSpy special subscriptions with extended time until July 15th,  2013 - buy now and  get the subscription time doubled for the initial price.

mSpy Subscriptions for: 1, 3, 6 and 12 months (You get 50% discount)


Mobile smartphones and tablets are the most vulnerable source of harmful situations that might affect the safety of children and generate data leaks at work. mSpy tracking software - to take control over these risks.

Recognizing the quality and ease of use of  service, mSpy has been rated second best by TopTenReviews and it got the best 10/10 feature set rating!

Whether you're feeling unsure about your child's whereabouts, want to limit the exposure to inappropriate content, help prioritize important things for your child or simply have a peace of mind, mSpy Home is the perfect solution for you. It leaves no stone unturned in monitoring the target device (be it a smartphone or a tablet) and feeds you the detailed information straightaway via its unified Control Panel.

Saturday, December 22, 2012

Comodo Endpoint Security Manager - solution for administrators of corporate networks


Comodo Endpoint Security Manager is a solution for administrators of corporate networks, deploy, control and monitoring software for managed network computers.

Comodo Endpoint Security Manager (CESM) enables administrators to enhance and deploy complete protection for network computers. Product can centrally manage, carrying protection with solutions such as: Comodo Internet Security (Firewall + Anti-virus), Comodo Disk Encryption, Comodo DiskShield, Comodo Secure Email, Comodo AntiSpam etc. Etc.

CESM is an integrated application that consists of interconnected modules:

- Administrative Console;
- Central Service;
- Remote Agent;

Administrative Console: Provides easy access to all business objects and system tools, managing CESM solution through friendly interface.

Friday, December 21, 2012

IBM Security Access Manager 7.0 - Protection of cloud, mobile and web applications


IBM has announced the upcoming release of a new version of its package of IBM Security Access Manager (ISAM) 7.0 to provide enhanced security access to mobile, cloud and Web applications of the customer.

Available as a virtual single server, the package ISAM 7.0 is a scalable (up to tens of millions of users) and flexible control of access rights and user activity. Access control encompasses a variety of existing Web applications and services.

Besides controlling the access rights, the package ISAM 7.0 facilitates complex task of centralizing user authentication systems, and provides a single authorization management to online portals. ISAM package integrated with the services of collecting information on threats in real time, helping to protect web applications from newly discovered vulnerabilities.

Thursday, December 20, 2012

eScan about actual problems of safety of Android


Govind Rammurthy, CEO, eScan MicroWorld, told the publication VARIndia about actual malware targeting Google Android, as well as the best means to protect the platform.

Mobile devices have already been able to press the desktop and continue to gain market because they provide excellent flexibility and extensibility of the working environment, have enhanced capabilities for working with applications, social networking, etc. But, like any other, mobile technologies have their own shortcomings - for example, they are vulnerable to malware and hackers.

Today, attacks on the Android operating system are considered among cybercriminals very lucrative form of business. This is not surprising, given that the OS has taken now the market leader: according to research firm Gartner, the market share of the Android OS increased from 46.5% in 2011 to 64.1% in the second quarter of 2012 is almost four times greater than that of the OS used by Apple iPhone, whose share was 18.8%, and 23.7 times higher than the current market share of Windows Phone (2,7%).

Wednesday, December 19, 2012

Cyber-attacks 2013 will become more aggressive

Symantec has published a forecast of trends in the world of cyber security in 2013


According to experts of the corporation in 2013, attacks will become more aggressive and will be not only to wages or espionage, but also to demonstrate the power of attackers. In addition, the number of threats to mobile users and cloud technology, and to the audience of social networks.

Starting in 2013, conflict between states, organizations and individuals largely go into cyberspace. Online espionage is highly successful with a very low degree of provability. Governments as well as the various organized groups of persons continue to use cyber attacks to damage or destroy sensitive information or financial resources of their opponents. In 2013, we will see a virtual 'waved arms', ​​when the government, organization or group of individuals will use cyber attacks to demonstrate their power and make themselves known.

Symantec experts also expected to increase the number of targeted attacks aimed at an individual or organization stands for, such as certain political views, or being a minority in a particular conflict. Recently, we find this kind of attack in situations where the conduct of individuals or organizations is the subject of discontent of a group of 'hacktivists'.

While the prevalence of fake anti-viruses slowly eroding, the realm of cyberspace appear even more severe types of threats. Around the world are becoming increasingly popular, so-called, ransomware, software, extortionists.

Users of Windows 8 faced failures in OS work because of Webroot antivirus


Microsoft said the company's representatives at one of the forums that your antivirus software can block the user of the new operating system Windows 8.

According to the service Microsoft Answers, where company experts advise her clients on technical issues with the software giant's products, computers based on the operating system Windows 8 may be blocked by a third-party anti-virus software.

According to experts, the same problem may be faced by those users who are using anti-virus software company Webroot to version 8.0.2.79. Previous versions of the program, experts, "erroneously removed from the kernel of Windows 8 that part of the registry, which is necessary for the correct authentication procedure."

Users are faced with this failure was reported in Microsoft that they can not log in using the credentials of service identification and authentication 'Microsoft account' (formerly known as the company 'Windows Live ID' and used for single sign-on to all network services Microsoft , including Hotmail, MSNBC, MSN and Xbox 360).

It is worth noting that those users of Windows 8, which used in the system only accounts linked to 'Microsoft account', will be forced to make a 'rollback' of the OS to the point where was installed antivirus Webroot. The alternative to this action is to reinstall the operating system.

Monday, December 17, 2012

Critical vulnerability found in the Samsung devices


Vulnerability allows applications to read memory devices, and embed malicious code into the kernel.

XDA developer under the pseudonym 'Alephzain' said flaws in the mobile devices Samsung, which allows applications to read confidential data.

The vulnerability is present in ARM-processor Exynos 4, which is often used in smartphones and tablets the South Korean company. The researchers presented the exploit that allows applications to read data from the device's memory, as well as embed malicious code into the kernel.

Alephzain discovered a vulnerability when looking for a new way to bypass the security Galaxy S3. "The good thing is that I can get root-access to these devices, but the bad thing is that you can not control it."

Among the products to which the vulnerability can be noted such popular devices Samsung, as the Galaxy S2, Samsung Galaxy S3 and Samsung, GALAXY Note 2. Note that on the Nexus 10, which also uses the Exynos processor 4, the vulnerability does not apply.

Friday, December 14, 2012

The New Wave of DDoS Attacks on U.S. banks


The company Arbor Networks, has been providing protection from DDoS-attacks, reported this week that dramatically increased DDoS-activity against U.S. banks. At times of DDoS-activity reached 60 Gbit / s. Who exactly is behind the attacks, not reported.

Recall that in September this year a group of Middle Eastern Izz ad-Din al-Qassam Cyber ​​Fighters launched a series of DDoS-attacks against several major U.S. banks, disrupting service to a client of the latter. The group claimed that the attack - it's retribution for the placing on the YouTube clip of the prophet Muhammad.

December 10 is the same hacker group announced the launch of a new wave of attacks against banks US Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group and SunTrust Banks. In the message the group posted on Pastebin, said that "the second phase of the attack will be more ambitious."

Sami attacks this week confirmed the banks, saying that on Wednesday and Thursday, they reached the peak. PNC on Wednesday warned customers that the services of the bank are working with low productivity and as a result, some clients may have problems logging in, mobile and online banking. On Thursday, the bank reported a growing wave DDoS-traffic and unavailability of servers.

Thursday, December 13, 2012

Interesting vulnerability found in Microsoft's Internet Explorer


Vulnerabilities found in popular browser Microsoft Internet Explorer, allows hackers to track the movement of the mouse cursor on the screen, and (theoretically) to intercept sensitive information to be entered using the virtual keyboard.

On-screen keyboard and keypady traditionally considered the most effective means of protection against malicious software - 'keyloggers' that can log your keystrokes and thus capture passwords and other confidential data entered from the normal keyboard. However, web analytics website Spider.io found that the virtual keyboard does not guarantee the desired security if to open that page using any modern web browser Internet Explorer (IE from IE 6 to 10).

Vulnerabilities danger lies in the fact that its use does not require any additional software, and successfully identified the location of the cursor in the browser, even if the application window has been minimized by the user. All you have to do an attacker - is to buy ad space on the site you visit often, after which he will be able to follow the movements of the mouse as long as the tab is still open to advertising.

Staff research firm reported Vulnerabilities representatives of Microsoft in October of this year, but only now the news became public. Experts from the research center Microsoft Security Research Centre recognized the vulnerability, but said that the release of the corresponding patch does not appear in the immediate plans of the company.

Facebook updates the security settings again


Facebook is once again updated the work of the security system, making it easier for users to work with privacy settings, activity logs, and releasing a new version of the tool to remove the information.

In the social network also state that added to the site warning platform through which Facebook will remind users how to operate some of the functions, for example, how to hide a particular content in the Chronicle.

The company said that by year's end will earn new features for all users at the same time a few Facebook upgrades its own interface, adding a more intuitive icons and an updated toolbar at the top of the user interface.

The company said that the whole process of setting privacy promises to be more clear. Thus, in the course of its users will simply respond to clear questions: Who will see my data? Who can communicate with me? How do I block or contact with anyone?.

At the same time, the company promises to introduce new opportunities to provide access to certain information in the objects, such as streaming music.

Monday, December 10, 2012

Built-in Antivirus software Android 4.2 inexcusably weak


Scientists at the State University of North Carolina (USA) presented the results of the study, which shows a completely unacceptable level of malware detection in the new Antivirus from Android developers. As it turned out, the new service for local verification of Android-applications submitted in a fresh version of the 4.2, detects no more than 15-20% of known malware.

According to the latest information, the Android platform is analogous to Windows mobile platform in the world - for example, by popularity. On the other hand, this popularity is unpleasant underside: the growing popularity of the platform calls attention by cybercriminals and malware writers. For example, according to antivirus company Sophos devices running Android OS less secure than devices based on iOS or Windows Phone. Even the U.S. intelligence agency FBI in October issued a special statement on the risks that threaten users Android.

Android platform developers clearly understand that their system needs increased security. In September this year, they have absorbed the company VirusTotal.com, which specializes in measuring the effectiveness of different vendors. After absorption in the platform of Android 4.2 'Jelly Bean' got its own service for testing applications, designed to detect potentially dangerous software directly on the machine user.

Sunday, December 9, 2012

Updates for Windows 8, Windows RT, Windows Server 2012 и Internet Explorer 10


Microsoft will release an update of its products this week


The company said that in the next release will release a 7 updates for its recently software: Windows 8, Windows RT, Windows Server 2012 and Internet Explorer 10 (IE10).

According to the developers of Microsoft, December 11 this year, the software giant will release seven security bulletins contain fixes for vulnerabilities in software products. With five notifications are assessed by experts as "critical." Fixes to Windows Internet Explorer 8, and will be fixed with patches.

"Five bulletins include fixes for flaws that allow an attacker to remotely execute arbitrary code on the target system. They cover all the operating systems Microsoft, released after Windows XP", - said Alex Horan, a senior product manager at Core Security.

Note that the papers cover such operating software giant as Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows RT.

According to Gore, the most important fix would eliminate a critical vulnerability in Microsoft Exchange e-mail server version 2007 SP3, and in 2010 SP1 and 2. "This is my number one of all vulnerabilities," - said the expert.

Recall that in November this year, Microsoft has released only one critical bulletin.

BitDefender Client Security - solution for protecting and managing security for corporate workstations


BitDefender Client Security solution


BitDefender Client Security solution provides a set of functions oriented for small and mid-size and provides the following key features.

BitDefender Client Security - is only one element in the system of comprehensive protection of IT infrastructure supplied by BitDefender. This system includes solutions for the protection of any element of a corporate network - from the laptop to the server - and counter any type of existing and emerging threats.

BitDefender Client Security - solution for protecting and managing security for corporate workstations, providing resistance to viruses, Trojans, rootkits, spyware, phishing, spam, etc. A centralized management console enables rapid deployment, implementation and monitoring of security policies, as well as monitoring and reporting on the activities of all workstations and servers in the network.

All corporate products BitDefender running a local network interact and give a complete picture of IT security as the network as a whole and for each individual workstation or server running Windows or Unix. Information on any problem arising on workstations quickly reflected in the management console, and then the administrator can promptly determine and correct the problem with just one click.

Saturday, December 8, 2012

The company Bitdefender has released Antivirus for Windows 8


Bitdefender Windows 8 Security


Bitdefender company introduced a new version of Bitdefender Windows 8 Security, which the developers themselves, without false modesty, called "First Antivirus for Windows 8."

Computer owners will appreciate the functional and visually attractive 'tile' design of the user interface provides easy access to the most popular tools and features. However, those users who have a modern interface Windows 8 Modern UI does not hit the spot, will be able to run Bitdefender Management Console on the desktop.

Product Bitdefender Windows 8 Security scans of the user's request, and also provides protection against viruses and malware in real-time. The application includes a functional firewall and built-in spam protection. The inviolability of personal information meets function Identity Theft Protection, and a tool called Bitdefender SafePay guarantee security of various user activities, such as your bank account in the "online" or purchase of goods in the shops. Pages that accept confidential information, will be opened in a special secure browser.

Thursday, December 6, 2012

VIPRE Internet Security 2013 discount $21


VIPRE Internet Security 2013 Christmas promotion: $21 discount on all licenses


This may be your last chance ever to save on VIPRE Internet Security 2013! Deal ends December 21, 2012.

Protect your computer before it's too late Identity theft, data loss, PC hackers, cybercrime… the digital world is a scary place.

Keep what you love safe from online disaster with VIPRE Internet Security 2013, the only antivirus to prevent the number one cause of computer infections: out-of-date software, with its groundbreaking Easy Update tool. From now save $21 on your VIPRE Internet Security 2013 purchase.

We're giving away a Samsung Galaxy Tab every day through December 21. If you purchase VIPRE Internet Security 2013 during this time, you're automatically entered to win. Buy VIPRE now to save $21 today and get a Samsung Galaxy Tab!

Wednesday, December 5, 2012

Cloud-based Antivirus BitDefender 60-Second Virus Scanner


Bitdefender has released a rather unusual antivirus program called 60-Second Virus Scanner. This free utility scans the files on the PC, but analyzes them on a remote server that is in the cloud.

From the name of the program it is clear that it must be very fast: the full scan takes 60 seconds alleged. In practice, all is not so fast. As reported by users after the scanning software sends the data and displays the message "Waiting for server" (wait for data from the server). During the test had to wait 281 seconds before the server received a message "The virus has been found."

Of course, you need to make allowances for the newness of the program and neobkatannost technologies. Perhaps in the future Bitdefender allocate for this program more processing power, so that the analysis will be faster.

A simple utility scans your PC is really about a minute, but it provides only the most cursory scan. The test was tested only 32 processes and 1415 files: this is very small, even for a quick scan.

However, the transition to cloud computing may become a trend, because this approach offers several advantages both for developers and for users. Developers get full statistics of user actions, verification of licensed software, instant access to samples of new viruses. Users get easy-to-use and simple program that takes almost no resources of a PC and no brakes. The same utility 60-Second Virus Scanner eat off of only 30 MB of memory: it is almost invisible at all, even if it is run continuously in the background.

Researcher disclosed information about spoofing attack in Twitter


The owners of the accounts linked to mobile numbers without the PIN code are at risk of being compromised.

According to an independent security researcher Jonathan Rudenberg, users of Twitter, whose settings 'SMS-tweets' at the moment are open, are at risk of being compromised.

According to the expert, the information contained in the software social network vulnerability is that the service does not properly check the permissions of fake mobile numbers to the settings of the user account. Such a way, a remote attacker who knows the phone number of the victim, may conduct spoofing attack and take control over another microblog.

"To carry out an attack is enough to know the phone number attached to the user account. In this case, hackers can send messages with a fake number, "- said the expert.

Rudenberg also said that Twitter developers were notified of the presence of gaps in August of this year. Since then, however, they no effort to eliminate the threat.

Tuesday, December 4, 2012

Dr.Web Security Space and Dr.Web for Windows 7.0 and 8.0 updated


Company 'Doctor Web' updated the several of components in the products of Dr.Web Security Space and Dr.Web Anti-virus for Windows version 7.0 and 8.0. Update due to the elimination of the detected errors and the general improvement of product functionality. As described in the company, the products Dr.Web 8.0 for Windows has made the following improvements:

In the agent changed the default setting for the minimum level of proactive protection - in order to avoid blocking the installation of the software and updates of Windows. Was optimized system of import and export settings - now all settings are stored in the bin-files. However, a number of bugfixes interface and other defects in the work of the agent.

In scanning Scanning Engine service optimized verification processes. In the scanner, among others, the cause of the error that occurred when you press the 'Stop' during the scan.

The changes also affected service Dr.Web Control Service. Improved functional preventive protection: Fixed a bug related to the inability to save the value of the 'Block simulate a person'. Also excluded blocking the Microsoft Update when using the minimum level of preventive protection.

Panda Cloud Antivirus 2.1 - new version of the popular 'cloud' anti-virus


The company Panda Security, a leading manufacturer of protection against Internet threats, today announced a new version of its flagship product - Panda Cloud Antivirus 2.1, a powerful anti-virus application was created on the basis of cloud computing technology. One of the key features introduced in the new version is built-in protection against exploits, available in both commercial as well as the free version of the product.

According to the developers, the product of Panda Cloud Antivirus has learned to quickly identify and successfully neutralize the threats associated with the use of little-known vulnerabilities in installed PC applications (such as Java, Adobe, MS Office, etc.). A typical example of such malicious programs are known viruses or Blackhole Redkit. An innovative technique based on the built-in mechanisms of behavioral analysis and does not imply the availability of information about the virus in embedded databases. This means that the program can identify new varieties of malware threats before they are discovered and studied by experts in the field of information security

Developers have reported significantly increased the performance of the product and announce several other interesting improvements, such as an updated user interface and protection programs, store-bought Windows 8 Store, in real time.

Saturday, December 1, 2012

BitDefender Security Business Solutions

BitDefender Business Solutions enhances business productivity and reduces management and malware-related costs by enabling the centralized administration, protection and control of workstations as well as of the file and e-mail traffic inside companies’ networks.

Products are developed based on modern technologies protect against harmful software at a reasonable price and is ideal to meet the specific needs of small companies.

1. BitDefender Business Security

BitDefender Business Security Software provides protection against malicious software and bezopasnstyu management for file servers, mail servers, and jobs in the business environment. The product is designed for small and medium-sized companies and provides them with comprehensive protection.

Key features include:

- Anti-virus, firewall, antispam and antispyware for corporate users;
- Support for WMI administration tasks and manage updates Windows;
- Proactive heuristic protection against the latest threats;
- Support for centralized management of all BitDefender products on Windows;
- Improved protection from viruses and spyware for file servers Samba;
- Multi-layer spam filtering;
- Compatible with most distributions of Linux (for file servers, Samba).