Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Software

McAfee’s Artemis Putting Malware Signatures in the Cloud

by Shanmuga

"Essentially the idea is to offload some malware checks to an online database. When the software detects a program or file as being suspicious, probably through behavior checks, it takes some form of hash of the files involved and submits it in a database query to their most updated malware database. If a hit is […]

Read the full article →

Opera fixes critical flaws

by Shanmuga

"Browser maker Opera released an update to its software on Thursday, closing serious security vulnerabilities in the versions of its software for Windows, Mac, Linux and other operating systems.

Read the full article →

Symantec Acquires Windows Security Vendor PC Tools

by Shanmuga

"Symantec has signed a definitive agreement to acquire PC Tools, a provider of security and utilities software for Microsoft Windows. Financial terms of the deal, which is expected to close by the end of 2008, were not disclosed. Headquartered in Australia, PC Tools has offices in the United States, United Kingdom, Ireland and the Ukraine.

Read the full article →

Vulnerabilities: Do not open untrusted files using VLC Media

by Shanmuga

"g_ has discovered a moderately critical vulnerability in VLC Media Player, which potentially can be exploited by malicious people to compromise a user’s system.

Read the full article →

ZoneAlarm to offer security software for free today

by Shanmuga

CheckPoint Software Technologies Ltd, the makers of the famed ZoneAlarm range of security products will give away full versions of ZoneAlarm ForceField software on Tuesday, August 12.

Read the full article →

Vulnerabilities: Malicious subtitle file could harm VLC media player

by Shanmuga

"A flaw in the widely-used open-source VLC media player could allow an attacker to execute harmful code on a PC. The problem stems from a buffer overflow that can occur when the player processes subtitle files used for movies, according to a security advisory.

Read the full article →

Growth of Anti-Botnet Startups Points to AV Deficiencies

by Shanmuga

"A slew of software companies new and old are shipping tools aimed at slowing the botnet epidemic, but the emergence of this new market is seen by some analysts as an indictment of the existing anti-malware industry. With reliable statistics showing a dramatic rise in botnet-related computer infections, venture capitalists are now pouring money into […]

Read the full article →

Whitelisting of software is the way to go

by Shanmuga

"Anti-virus and anti-spyware technologies, which are packaged as ‘blacklist’ solutions, are gradually giving way to what security experts claim is a far more effective IT security technology based on ‘whitelist’ solutions. However, a comprehensive IT security solution would imply that vendors take care of the root cause rather than just specific problems which the lists […]

Read the full article →

Free tool blocks Facebook, MySpace, and Yahoo ActiveX vulnerabilities

by Shanmuga

"A researcher over at the Internet Storm Center has created a powerful GUI that will set the kill-bits on vulnerable ActiveX controls used in Facebook, Myspace, and Yahoo apps. These popular apps came under attack on Monday after researchers Elazar Broad and Krystian Kloskowski disclosed their findings to a online security newsgroup.

Read the full article →

TrueCrypt 5 released

by Shanmuga

"TrueCrypt, an encryption program designed to hide your data from prying eyes, has released a new update that adds the ability to encrypt an entire disk. Seems like just about everyday we read about yet another exposure of sensitive data because someone’s laptop was stolen, but if those careless employees had used TrueCrypt it wouldn’t […]

Read the full article →

Antivirus Inventor: Security Departments Are Wasting Their Time

by Shanmuga

"Peter Tippett thinks it’s time for security professionals to wake up and stop wasting their energy. In a presentation here yesterday, Tippett — who is vice president of risk intelligence for Verizon Business, chief scientist at ICSA Labs, and the inventor of the program that became Norton AntiVirus — said that about one third of […]

Read the full article →

Antivirus firms, testers form standards group

by Shanmuga

"Nearly two dozen companies announced on Monday the creation of an organization to set best practices and standards for the evaluation of antivirus software. As previously reported by SecurityFocus, more than 40 researchers met in Bilbao, Spain, last month to finalize the details of the group, dubbed the Anti-Malware Testing Standard Organization (AMTSO).

Read the full article →

MayDay! Sneakier, More Powerful Botnet on the Loose

by Shanmuga

"A new peer-to-peer (P2P) botnet even more powerful and stealthy than the infamous Storm has begun infiltrating mostly U.S.-based large enterprises, educational institutions, and customers of major ISPs. The MayDay botnet can evade leading antivirus products, and so far has compromised thousands of hosts, according to Damballa, which says 96.5 percent of the infected machines […]

Read the full article →

Malware: Malware Evolving Too Fast for Antivirus Apps

by Shanmuga

"If you think that the latest security suites afford complete protection against malware attacks, think again. Today’s for-profit malware pushers use dedicated test labs and other increasingly professional techniques to improve their chances of infecting your computer. And the techniques they employ to outpace security software makers appear to be working.

Read the full article →

Malware: How Antivirus Programs (Don’t) Work

by Shanmuga

"For over 25 years, the computer community has been dealing with malicious software. These little pieces of malware started as minor pranks and theoretical explorations into subverting security controls, but soon developed into more malicious programs that have left a significant impact on the computing community. Over the last decade we have seen viruses/Trojans/worms wreck […]

Read the full article →