.

Tuesday, October 4, 2011

Antivirus Help and Support to Protect PC

Get ready to re-define the concept of a virus-free life for your computer and enhance your work and productivity by installing good Anti-virus software on your PC. Anti-virus software ensures complete safety and security of your PC and is essential for computer users to shield their PCs from malicious viruses and spyware floating around the Internet.

Installing Anti-virus software and getting regular antivirus updates on your PC is mandatory for home users as well as small businesses. The software will remove all kinds of security threats from your PC. Apart from installing a good Anti-virus software, it is also important to configure a computer's Firewall to shield your PC and protect it from malicious attacks. Installing security programs on your PC will also help detection and removal of all spyware and viruses, optimizing and scheduling automated virus, spyware, and adware scans can also protect your PC from various online threats.

Anti-virus is a useful program designed to prevent, detect and eliminate malware, viruses, worms, Trojan horses etc. It can also prevent and remove adware, spyware and other forms of malware.

There are many ways that an anti-virus program can use to detect and identify a virus.

First, it scans/monitors the programs by its code, if it finds a program code that matches with the virus code in its signature database; it will consider that program a virus. This method is known as Signature based detection and is the most common method.

However, there are times when you have too many software and applications running on your PC and you will need to uninstall antivirus software from your system to make your PC run faster. Also, at times, you might have an older version of anti-virus software installed on your PC, and so, in order to beef up your security, you might need to uninstall the older version from your PC and install the latest version.

K.Pd.Pandey is a technical and security specialist, associated with numerous tech firms. These firms are synergistic ally aligned to offer for technical support, antivirus support, antivirus protection, install antivirus and computer repair services to its clients in US, UK, Canada & Australia by certified technicians.


Source: http://EzineArticles.com/5555770

Thursday, September 22, 2011

Antivirus Help and Support to Protect PC

Get ready to re-define the concept of a virus-free life for your computer and enhance your work and productivity by installing good Anti-virus software on your PC. Anti-virus software ensures complete safety and security of your PC and is essential for computer users to shield their PCs from malicious viruses and spyware floating around the Internet.

Installing Anti-virus software and getting regular antivirus updates on your PC is mandatory for home users as well as small businesses. The software will remove all kinds of security threats from your PC. Apart from installing a good Anti-virus software, it is also important to configure a computer's Firewall to shield your PC and protect it from malicious attacks. Installing security programs on your PC will also help detection and removal of all spyware and viruses, optimizing and scheduling automated virus, spyware, and adware scans can also protect your PC from various online threats.

Anti-virus is a useful program designed to prevent, detect and eliminate malware, viruses, worms, Trojan horses etc. It can also prevent and remove adware, spyware and other forms of malware.

There are many ways that an anti-virus program can use to detect and identify a virus.

First, it scans/monitors the programs by its code, if it finds a program code that matches with the virus code in its signature database; it will consider that program a virus. This method is known as Signature based detection and is the most common method.

However, there are times when you have too many software and applications running on your PC and you will need to uninstall antivirus software from your system to make your PC run faster. Also, at times, you might have an older version of anti-virus software installed on your PC, and so, in order to beef up your security, you might need to uninstall the older version from your PC and install the latest version.


http://EzineArticles.com/5555770

Thursday, September 15, 2011

KELLNER: Avoiding high-priced anti-virus scam

A reader in Chantilly received a bit of a shock about three weeks ago, and then got what nearly became a very expensive online education. One of the latest scams, or rip-offs if you prefer, to hit computer users via the Internet is an “anti-virus” scam, where slick operators promise to fix your computer online, and maintain it for two years, all for the “low” price of just under $270.

The reader, who asked that his name not be used, was charged just one cent under that figure, $269.99 to be precise. Given that good anti-virus software for Windows-based PCs can be had for as little as $8.99 at Amazon.com and generally for not more than $40, the price this reader was charged ranged between roughly seven and 30 times what they should have paid.

The incident started innocently enough: the reader was ending a Windows work session, and the program indicated there were updates to download. The reader let this go on overnight, returning to the computer the next morning. On firing up Internet Explorer, Microsoft Corp.’s popular Web browser, the reader noticed something was different.

“I noticed that the address bar and the other tool bars at the top would go away when the arrow was moved away from the top, thus making the screen slightly larger,” the Chantilly reader later wrote. “This started becoming very annoying after awhile, particularly, because some of the material was not coming back. And it was time consuming.”

The reader then called “a number I thought was [Microsoft Corp.‘s] tech support,” which he said was obtained via a Google search.

He added, “They talked me into letting them on my computer. They brought up a page that said I had over 56,000 error messages and that told them that my computer was in terrible shape and even if I bought a new computer, the same mess would come through my Internet service and infect a new computer.”


Source:- www.washingtontimes.com

Thursday, September 8, 2011

How to Get The Best Antivirus Support

Computers have effectively changed our lifestyle but they are always prone of virus intrusion. As their importance is increasing a proper protection for them is also required. A virus can intrude into a computer through any data storage device which carries infected data and comes in contact with the system. If a computer is connected to a network, chances of virus intrusion become very high if it is not protected by effective antivirus software. The Internet has changed the whole method of communication and now the world seems as an area without boundaries. In this scenario chances of virus intrusion in a computer connected with the Internet have become very high.

What is a computer virus?

A computer virus is not like of a virus which infects a human body. A computer virus is a program that can copy itself and infect a computer. A computer virus is also called malicious software or malware. There are many kinds of malware also that can not reproduce themselves but can infect the computer. If files on a network file system get infected by computer virus, chances of spreading of virus will become very high because that file system is accessed by other computers too.

What is Antivirus software?

Antivirus software is a program that can detect and eliminate viruses on a computer. A virus removal software application uses two common methods to detect viruses. One method is of using a list of virus signature definitions. In this method the contents of computer's memory (RAM and boot sector), files stored on removable or fixed drives (floppy drives, hard drives) are examined, and then compared with files against the database of known virus signatures. This method gives protection to the computer against only those viruses whose virus signatures are stored in the database.

The second method is based on heuristic algorithm to find out viruses based on common behaviors. This method is more effective as it can detect those novel viruses that antivirus security vendors have yet to create a signature for.

A user can download and install computer security software from the Internet for protecting his system. There are many vendors who provide solution against different kinds of security threats from computer viruses. Some names like Avast, McAfee, Norton and Kaspersky are very common in virus removal software.

Although it is very easy to download and install antivirus program but it must be done under an expert's guidance. There are several things that need to be checked before installing this type of software on a computer. First of all, make sure that your computer is not infected by any kind of virus. Virus removal software might not work on a computer that is already infected by viruses. Some type of computer viruses mimics the behavior of different files; antivirus software may not be able to detect them.

Article Source: http://goo.gl/yHuPs

Tuesday, August 30, 2011

Fake antivirus attack driven by Web ads


An Internet security firm has identified a new variant of a fake anti-virus attack that uses Web advertisements to relay users into the Shnakule network, a large malware delivery network on the Internet.

The Shnakule network has averaged around 2,000 unique host names per day with as many as 4,357 in a single day. It has been very active with fake anti-virus attacks typically conducted via search engine poisoning, according to Blue Coat Systems.

With this latest attack, Shnakule is now using malvertising to conduct its attacks. To date, the Blue Coat said it has identified more than 15,000 user requests related to the latest form of the attack.

The latest Shnakule attack is a three-staged attack that utilizes malicious Web advertisements. In the first stage, malicious ad servers were set up as independent entities, not directly associated with each other or any existing Shnakule sub-networks, to route users to malware.

In the second stage, a new Shnakule subnetwork relays users to the malware. The final stage is the malware payload, which changes frequently in an attempt to avoid detection from anti-virus software.

“Though this attack initially launched in late June, it is still continuing, and in a recent check of the payload by Blue Coat Security Labs against 43 anti-virus engines only two of those engines identified the payload as malicious or suspicious," said Chris Larsen, senior malware researcher for Blue Coat Systems.

Read more: http://goo.gl/FXpkr

Tuesday, August 23, 2011

Remove a Virus Without Antivirus


Virus attack is a universal problem faced by millions of PC users around the world. If you find your system infected with virus, it is highly recommended to call in antivirus support experts to delete it as trying to do it on your own can prove harmful to your pc. Usually, people use antivirus software programs available in the market to control and remove virus from their computers, but most of them may not be safe.

Is it possible to remove virus without antivirus ?

Did you know that it is possible to remove virus without using any antivirus software? If you want to know how to remove virus from your computer without using an antivirus, here are a few simple steps to follow:

Steps to remove virus from computer -

1. Go to the "Start" menu and to the "Run" command.

2. In the text box, input the "cmd" command.

3. In the DOS window, you will see a command prompt. Input the Command Prompt to shift it to the infected drive. This can be done by typing the drive letter and a colon. After typing in "attrib-s=h*_*/s/d", wait for the prompt to read the right drive before pressing "Enter".

4. Input "dir" command to make the content directory of the drive appear. Here, you can identify suspicious looking.exe files. Files that are accompanied by.dll or.inf are dangerous files.

5. Go to files that activate virus and are attached to the.exe file and rename them. This can be done by typing "Rename" followed by the name of the file and any other name you choose. This way, without activating the virus, you can access the drive anytime you want to.

6. The next step is to find the drive folder that contains all files infected with the virus. You can find this folder in the "Program Files". After deleting the infected files, it is now time to completely eliminate them from the Recycle Bin.

7. Input "regedit" in the Run Window to open the registry editor. Folders that are named "HKEY" are the registry keys of the virus. You can find them within the folders and must delete all keys associated with the virus. After removing all the virus and related registry keys, you must reboot your computer.

Article Source: http://goo.gl/DixY7

Friday, August 12, 2011

Compare Anti-virus and Anti-phishing Software

Computer users should be aware of potential security threats when using the Internet. Viruses infect a computer and create unwanted changes, such as pop-ups, while anti-phishing scams aim to learn a user's sensitive private information by impersonating legitimate contacts or websites.


Function

Anti-virus, anti-phishing and other anti-malware software protects the user's computer by detecting attempted infections and/or removing existing infections when the user performs a scan with the program.
Significance

There are many program options for protection against viruses or phishing scams. Some are free while consumers must purchase others. These programs may not all offer the same level of protection or support. Although the user may not wish to pay for software, he may be forfeiting superior features such as real-time protection, malware definition updates or tech support if he chooses free software.
Considerations

Anti-virus solutions such as Norton, AVG of Avast! Free offer protection at all times, unless the user disables this feature. Other anti-malware software, however, may operate on a standalone basis and only provide protection after infections. One anti-malware program that offers real-time protection is Spybot - Search & Destroy.
Misconceptions


Anti-virus programs do not automatically have anti-phishing protection and the opposite is also true. Some software suites may offer both anti-virus and anti-phishing tools, while others offer specific programs for dealing with each type of threat. The user should compare the solutions that each company provides before choosing one that may not fit her needs.


Read more: http://goo.gl/adFbw

Thursday, June 23, 2011

How to install Windows® 7 Themes

Marking your territory with Windows 7 themes

 If you are a baseball fan or a Ferrari fan, then you might have posters of your passion all around the bedroom walls, or wear iconic T-shirts to express your nirvana for the passion that you have. Isn’t it true with you? So if you have a Windows 7 desktop or laptop computer, you would certainly want to mark your territory i.e. if you own a desktop or laptop. This should certainly keep your friends and families getting too associative with your desktop, as your themes certainly won’t match their interests.

Windows 7 themes are not just artistic techniques to make your boring desktop look more appealing. They are an expression of your interests, thoughts, and trends. Besides, there are thousands of different themes that you can install. If you have the habit of using your grey cells too much, then you can create your own themes.

Here is a brief gist of how you can install Windows 7 themes on your computer:-

Read Full Story here  http://windows7.iyogi.com/news/how-to-install-windows-7-themes/

 

photobucket® App for Windows® Phone 7

Organize your collection of photos with photobucket

If you are photography enthusiast or a frequent traveler, then taking photos of memorable moments will be one of your hobbies. Things can get even better for you if you have a Windows Phone 7 as, there is an app called photobucket which helps you organize all your photos and videos to share with your friends over social networks.


Some of the features of this app can be listed as follows:-

    * Cost: photobucket is absolutely free. If you are downloading this app for your Windows Phone 7 you won’t be charged a cent. You can also get the updated version of this app on your desktop for free as well.

    * Storage: The amount of photos and videos that you can store with this app is unlimited. The latest figure for the amount of photos uploaded on photobucket is more than 8 billion.

    * Tools to Tweak Photos: Add a stint of spice and style to your photos by being creative with your photos and videos. You can edit all your photos and videos, with various tool options and preserve your memories.

    * Categories: All your photos and videos are stored in ‘Categories’ which enable you to easily navigate through them. You can also tag your photos in order to make photo and video search easier for you.

To download this app for your Windows Phone 7 click here. Once you have downloaded the app click on the upload icon in the home screen.

Friday, June 3, 2011

Antivirus Software - Get The Bugs Before They Get You

In today's online world, protecting your computer from all the nasty things online is vital. Viruses can cause obvious issues, as described above, but they can also run silently in the background, propagating themselves across your computer and transferring on to the computers of people you know. Mostly, you only know you have a virus when substantial damage has already been done.

Some common signs of a virus include:

    Programs working erratically
    Computer locks up
    Greyed out options
    The browser home page has changed
    Icons have changed
    Difficulties starting up the computer

There is a solution! Antivirus software is readily available, and the good ones are very efficient at dealing with viruses in all their many and varied mutations. Basically, if you're online, you need this type of software.

So which one do you choose? For starters, be careful of using something free off the internet, particularly if it's one you've never heard of. Sometimes these programs are a way of implanting more viruses on your computer. Some of the better known brands give you the option of doing a free scan online, which is useful, but not a long term solution.

It's really important to choose well-known antivirus software. Ask friends, or someone computer savvy, for their recommendations. It may be worth visiting a computer store and buying it there, rather than online - after all, if they've gone to the trouble of stocking it, it's most likely an established and trusted product.

There are plenty of good brands available, far too numerous to list here, but some of the best known are from McAfee, Norton and Trend. Check out the support available to you - can you contact someone if you have trouble installing the software?

Most importantly, make sure there's an easy way to update the software on a regular basis (preferably as part of the purchase cost!). For example, my antivirus software pops up a little box every time an upgrade is available. I click okay, and it's automatically downloaded to my computer. Viruses change and develop at an alarming rate, so it's vital to keep your antivirus software up to date.

Finally, the all-important backup! The word "backup" tends to produce the same glassy eyed response as the word "budget", but it really is an essential part of being online. Regularly backup your important files to CD or DVD. If you're a business user, an automated and frequent backup process is vital. Once a virus has destroyed your computer, it's too late.

Read more: http://goo.gl/GS8YL

Wednesday, May 18, 2011

Get Network Support to Keep Your System Virus Free

Computer viruses have taken its full control over the internet world. Various types of virus, adware, spyware and malware have been lurking around every corners of the internet world. So it is extremely important for you to maintain the tight security of your system from their attack. The network support expert team can protect your system from this menace. The computer support expert team advises the users to follow some simple steps so that the security of the computer can be maintained.

You need to keep Windows Critical Updates Current:

If you are using Windows 2000 or Windows XP you need to update the critical alerts. The viruses can attack any time if some Windows vulnerabilities are found. The updates in the critical area keep givers protection against any flaws in the operating systems. So you need to ensure that you use the current updates and run the virus scans on regular basis.

The experts at network support advised to run the updates and scans in the safe mode so that your system can be safe against losing any data. For running your computer on safe mode you need to restart the computer and press the F8 key instantly. It will show a menu "Safe Mode with Networking". Highlight the term and click OK.

The computer support team advised the users to check the Windows critical Updates. For doing this you need to open the browser and go to the tool menu. Going there you need to click on Windows Update. If the term Microsoft Security Warning is seen, you need to click yes and then you have to click on "Scan for Updates". Then you can review the updates and can install the updates you think important.

Our network support team suggests you to go for the automatic updates. It will give you a hassle free maintenance of the system. For doing this you can go to the control panel and can click on "System" it is suggested that you enable Automatic Updates. To do this on a Windows XP computer, go to the Control Panel. This may be found by clicking on the Start Menu, select Settings and select Control Panel. In the Control Panel you need to click on "System". Then you need to find the "Automatic Update" tab and make sure the "Keep my computer up to date" is enabled.

If you face any sort of difficulties you can call any time to the 24/7 computer support experts will help you with their expertise views and suggestions. They can even make the process hassle free for you by providing remote network support.

For keeping your system virus free you need to have antivirus software installed in your system. Run the scan properly on regular basis to keep the system safe.

Source: http://goo.gl/pZUZn

Sunday, March 6, 2011

How To Remove Facebook Koobface Virus Removal

When you try to login to your Facebook account, you accept abundant requests for alteration password. It ability be some hacker, aggravating to affect your computer with Koobface virus. This virus can not alone aperture your contour data to exceptionable individuals but can as well blast the anamnesis of your computer.

What a Facebook virus is? 

Facebook virus is basically a "Koobface" virus whose primary ambition is the Facebook users. This virus which targets Facebook users, compose a spam bulletin and again forward this bulletin to the adulterated users' accompany application the messaging arrangement on Facebook. This virus aims at installing Trojan software on the adulterated user's computer arrangement and again accustomed out its accompanying assignment for which it is designed. The spam bulletin includes links which redirects to several bearding websites that in absolute are the bluffing and phishing websites.

Just chase these simple and simple to apprentice accomplish or apprenticeship for Facebook virus abatement from your computer manually:

STEP 1: Terminate the afterward processes:

fbtre6.exe

mstre6.exe

STEP 2: Annul the beneath mentioned anthology values:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run"systray" = "c:\windows\mstre6.exe"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run"systray" = "C:\Windows\fbtre6.exe"

HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating

STEP 3: After deleting the anthology entries, annul these files:

C:\\Windows\\fbtre6.exe

C:\\Windows\\fmark2.dat

You can download MalwareBytes Anti-Malware accoutrement for Virus abatement that automatically ascertain and abolish the Facebook virus from your computer.
 
Visit here for more info on Facebook Virus Removal & Virus Removal Tools for your Pc.

Thursday, March 3, 2011

Tips & Tricks To Detect Adware and Spyware To Safe Your PC

Adware are some of the most ridiculous items on the network of spies with viruses and other malicious software programs. While adware is expected to be the most types of spyware, the full horror of Web User obvious method and problems of the promotion. By and large they are tricked into clicking on such adwares and end with a serious accident to have an extra distance.

What are adwares anyway? Adware or advertising-supported software is ready, as some computer program or software developed in which the promotion and additional advertising thing is systematically integrated or comprehensive software. Adware is usually played following mechanism. A number of hate adware download information about your computer or actions of its users, even without the authorization of his client. Adware usually figure displays ads that will appear in a popup window or anywhere on the PC screen.

Software applications show these banners in promoting a program or open from one end to trigger an additional device. Almost all adware is included in an application for free. This is a method for developers to improve the costs of creating such software. A famous case is the Opera browser, which is free, except for the application comes with a small lineup. Adware be able to reach the exit after the user purchases and records of their breeding program. Therefore, it is a device that generates income. A company can support adware to arrest more people and potential customers. Adware as an approach to advertising is one of many techniques used by websites to attract additional traffic.

However, a few others are adware annoying ads and shiny now. In many cases, adware escort another malicious program that downloads the customer information was made without their consent. Users surfing are followed, in some cases, browser homepage changed, or is redirected to the sponsorship of the adware business. These types of adware are dangerous because they could endanger the physical state of the PC system. Sideways to install malicious software that could well become a road for viruses to attack the system.

Adwares are moved to the flames below is simply for reasons of their maddening crowd and the appearance of pop-up banner with the exception of the very means that they attack the insulation of the consumer. Follow the software programs and spyware are now two "bad" forms of adware can be obtained. That is why almost all PC users will try to get clear of these adware. Since the nature of irritating pop-up ads, the majority of browsers currently in use adware method of harassment during the appearance of pop-up blocker or blocking software. Browsers such as Microsoft Internet Explorer and Mozilla Firefox, all employ pop-up blocker, which instantly block or close a window, which is activated by an adware site visits by consumers. These actions have substantially reduced the number of irritating adware that pops up every time you access the site.

Most antivirus programs and utilities now feature hunting and adware removal system. These indices of spyware and adware identified exclusive of 'universe, and sees it as a system of personal computer user will then isolate or remove the bad book. But despite the hard work is often near the adwares, go to the web with fever and banner ads displayed and programs say they bring into the PC system. Like an annoying adware essay continues, the World Wide Web are well prepared for an excellent exchange and utilities to combat them.


Wednesday, March 2, 2011

Sophisticated Trojan Targets Some Banking Sites

S21sec, a Spanish information security firm, claims to have spotted a new Trojan with advanced infiltration and attack techniques.

This Trojan, named Tatanga, like most banking Trojan, possesses man-in-the-browser capabilities, can inject malicious HTML code into many popular browser types. According to S21sec, the Trojan can conduct banking transactions in the background. The Trojan can display a fake balance, which the end user perceives as the real account balance, while their account is being fleeced.

"The trojan in question is rather sophisticated," the company posted in its research blog. "It is written in C++ and uses rootkit techniques to conceal its presence, though on occasion, its files are visible. The trojan downloads a number of encrypted modules (DLLs), which are decrypted in memory when injected to the browser or other processes to avoid detection by antivirus software," it continued.

Some of those libraries grab email addresses, encrypt and manage the malware's processes, remove other forms of malware on the machine, as well as block installed antivirus applications.

Learn how IT and finance can work together to succeed in a recovering post-recession economy.
Where Finance Belongs on the IT Agenda

The Trojan can also grab user credentials during the session, including one-time-passwords. The malware relies on both technical attacks as well as social engineering tactics designed to walk users through a transfer they think is a demonstration transfer.

S21sec has a snippet of the Trojan's code on its site.

While the Trojan is currently targeting European banks, mainly in Spain, United Kingdom, Germany, and Portugal – these attacks rarely remain localized.

Unfortunately, according to the security firm, the anti-virus detection rate of this Trojan is currently very low.

Sunday, February 27, 2011

Top 5 Best Anti Virus Software

Avast Antivirus Software - image resource avast.com
Avast: A Czech computer-technology innovator developed a program called “AntiVirus Advanced SeT” or Avast. They knew that a good antivirus is necessary which is dependable, fast, reasonably sized, and unobtrusive. An antivirus should scan and update automatically. It should provide an occasional reminder that it works. Avast is unique. 

Kaspersky: This antivirus is known for exposing, analyzing and neutralizing IT threats. Kaspersky Lab is rated as one of the world’s top four leading IT security software vendors for endpoint users (according to IDC). They have an innovative distributed malware control system.  Kaspersky also uses an integrated solution for optimised home network protection. They have a security and user-friendly reliable solution that protects mobile devices from network attacks, malware targeting mobile platforms and SMS spam.



Avira: A leading German security specialist, they provide cross-system protection of networks on various levels. Avira adapts to the current security requirements of the users. Avira is one of the world’s first ever products with dialer detection. This dialer detection was very quickly followed by the detection and removal of adware and spyware. They include the detection of already active root kits. The introduction of a firewall and behaviour blockers is a milestone for avira.The have added the development of various new special scanning technologies, for PDAs, handheld and embedded devices.

AVG: For business security, AVG provides AVG Internet Security Business Edition 2011, for home security it provides AVG Internet Security 2011, for free edition it gives basic protection for surfing, searching and social networking. The home security provides security from social networking protection for popular sites like Facebook. The basic free edition provides Anti-Virus & Anti-Spyware. The business provides vital security for your small or medium-sized business. Protecting laptops, PCs, file servers and email servers, all in one easy-to-install package.

K7: K7 provides antivirus protection with the fastest scanner which is easy to install with user-friendly interface and small footprint that ensures optimum PC Performance. It ensures protection against known and unknown web threats. Also ensures safer internet and Wi-Fi connectivity. K7 helps in safe and secure online banking. It protects your personal and confidential information and protection against phishing attacks.

System Tool Virus Removal – Microsoft Issues Guidelines

An obscure fault in Microsoft’s Adware and spyware Protection Program could result in a susceptability whenever the actual application executes a computer virus diagnostic, as reported by Microsoft’s security advisory.


In the course of a scan, the core fails to digest a specially constructed Registry value correctly

This in turn could very well allow an hacker to elevate their system access from restricted to admin stage to implement passcode and from there tamper with data, generate different data with the help of full user rights or install programs.

Microsoft says the offending mpengine.dll is part of Windows Live OneCare, Microsoft Security Essentials, Windows Defender, Forefront Client Security, Forefront Endpoint Protection and the Malicious Software Removal Software.

All variations up to 1.1.6502.0 are vulnerable.

The weakness has yet to be observed in the wild and will be repaired instantly at the next patching opportunity, Microsoft explained. Meanwhile a physical fix may be downloaded from Microsoft’s site.




Resource - http://ozute.com/system-tool-virus-removal-microsoft-issues-guidelines/224632/

Thursday, February 24, 2011

Microsoft fixes A Security Bug In Its Virus-Scanner

IDG News Service - Microsoft has patched a bug in its malware scanning engine that could be used as a stepping stone for an attacker looking to seize control of a Windows box.

The bug is fixed in an update to the Microsoft Malware Protection Engine that was pushed out to users of Microsoft's security products on Wednesday. It's what's known as an elevation of privilege vulnerability -- something that could be used by an attacker who already has access to the Windows system to gain complete administrative control.

Microsoft hasn't seen anyone take advantage of the bug yet -- the flaw was reported to the company by security researcher Cesar Cerrudo -- but Microsoft thinks that hackers could develop code that reliably exploits the issue.

In an instant message interview, Cerrudo, the CEO of security research firm Argeniss, said he disclosed the bug publicly at the Black Hat security conference in July 2010. But because the hacker would already need have access to the machine to pull off this attack, he doesn't believe that it presents a major security risk to most users.

"This vulnerability could be exploited remotely, for instance on Internet Information Server, but the attacker will need to be able to upload an execute code on IIS," he said. "Sites that allow users to upload Web pages, they are more at risk."

Microsoft rates the issue as "important."

An attacker could take advantage of the flaw by changing a Windows registry key to a special value, which would then be processed by the malware engine at its next scan.

This would be useful if the criminal was already on a machine that had locked-down user privileges. "An attacker who successfully exploited this vulnerability could execute arbitrary code... and take complete control of the system," Microsoft said in a security advisory, released Wednesday. "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."

The issue is fixed in Version 1.1.6603.0 of the Malware Protection Engine, which is used in Windows Live OneCare, Microsoft Security Essentials, Windows Defender, Forefront Client Security, Forefront Endpoint Protection 2010, and the Microsoft Malicious Software Removal Tool.

Consumers should get the fix automatically as part of Microsoft's monthly update to its malware scanner.

This isn't the first time that Microsoft has found bugs in its security software. It reported bugs in the Malware Protection Engine back in 2007 and 2008.

Tuesday, February 22, 2011

Avast Antivirus 6.0 Combats Trojans With Virtualization

NEW DELHI: Security firm Panda has launched Panda Antivirus Pro 2011 provides the users something more than what a simple antivirus does.

Panda Antivirus Pro 2011 assures protection against all kinds of viruses, spyware, root kits, hackers and online fraud, claims the company.

The key features of Panda Antivirus Pro 2011 include antivirus and firewall protection. In addition to this the solution also showcases a Multimedia and Gaming Mode, Home Network Manager plus a Safe Browser to surf the internet without any worries.

Speaking on the launch of the product, Yoke Mon Chin, Marketing Director, APAC Panda Security says, "The cyber-crime black market, which was traditionally centered on distributing bank and credit card details stolen from users around the world, diversified its business model in 2010, and now sells a much broader range of hacked confidential information including bank credentials, log-ins, passwords, fake credit cards and more.

But, Panda's Antivirus Pro 2011 assures safer and faster use of internet through its Collective Intelligence Technology".

Android Search Engine Manipulation Trojan Dissected

A rash of Google Android malware has appeared in recent weeks, causing one security researcher to dissect how one nasty piece of code, Android.Adrd - a search engine manipulation trojan - functions, and compare it to another piece of malware, Android.Geinimi.

According to Takashi Katsuki, a security researcher with Symantec Asia-Pacific, Android.Adrd is unique in being the first Android operating system trojan whose purpose is search engine manipulation.

Propagation of Adrd and Geinimi, he says, is via pirated software, which allows the author to 'trojanise' the Android device and so deliver malicious content on top of clean content.

"Both threats register themselves to run at boot time. Android.Adrd also registers itself when a phone call is made or network connectivity settings are changed", he says in his latest security blog.

And here's where it gets interesting as Android.Geinimi opens a back door on a device and has more than 20 functions, such as making calls, sending text messages, and stealing sensitive information.

"On the other hand, Android.Adrd is very basic in comparison. When Android.Adrd is running, it receives a collection of strings from a remote server and then repeatedly performs search operations in the background (i.e. not visible to the user)", he says.

Katsuki claims that the search operations of the malware are made through HTTP requests in the following format:

wap.baidu.com/s?word=[ENCODED SEARCH STRING] &vit=uni&from=[ID]

Interestingly, he says, the immediate goal of these requests is to boost the site ranking of a Chinese mobile website via the popular Fas Eastern Baidu traffic union programme.

The HTTP requests result, he adds, in many artificial 'searches' for the terms supplied by the trojan's author(s), so artificially increasing the mobile site's ranking in the Baidu search engine's 'recommended sites' listings for certain search terms.

And so on to the money trail, which is where the hackers behind the trojans generate their revenue.

Android.Adrd, says Katsuki, doesn't beat about the bush, as its primary intent is search engine manipulation/click fraud from a mobile device.

"To make sure the threat is continuously productive, the creators have even gone to the extent of adding routines to identify the connection method being used (WiFi or 3G access)", he says.

The interesting twist here, adds the Symantec researcher, is that fraudulent apps running on mobile devices have an advantage in that they can switch between connection methods - which can help them evade fraudulent click-checking mechanisms.

"In contrast, there currently is no definitive financial motive that can be attributed to Android.Geinimi", he notes.

"Even though Android.Adrd does not appear to be hugely complex, one should bear in mind that it includes an update function that allows the attacker to update and modify functionality or behaviour when required. Given this, please ensure that your mobile device antivirus product is up to date", he concludes.

Monday, February 21, 2011

The Best Options To Protect Your Computer From Trojans Viruses & Spywares

When it comes to anti-virus software for your computer, most experts agree you need it if you have the Windows operating system and often go online. Some of the options:

Free software

Popular free products include Avira AntiVir Personal, AVG Anti-virus Free Edition, Avast! Free Antivirus and Microsoft's own Security Essentials. Be aware that many free products, while good at what they do, are essentially a marketing tool to persuade you to buy the same brand's paid version. Microsoft is an exception. It has no upsell.

Some reviewers claim the free anti-virus software might be all you need. Consumer Reports, for example, says free products are "fine for most people."

Where to find some of the free products:

• Avira: www.avira.com

• AVG: free.avg.com

• Avast!: www.avast.com

Thursday, February 17, 2011

Microsoft Calls for "Collaborative Defense" Against Internet Threats

Just as doctors and national health organizations work to educate about and prevent health risks, Microsoft (News  - Alert) wants to encourage companies to work together to prevent a different type of risk- cyber warfare.


During a keynote speech delivered at the RSA Security (News  - Alert)  Conference this week, Scott Charney, Microsoft’s corporate vice president for Trustworthy Computing, discussed the dangers of Internet and PC security in today’s cyber age and how a “collective defense” needs to be developed to fight these problems.

“When cyber threats first started emerging in the ‘80s and ‘90s it was about individual defense,” Charney said. “… Individual defense is helpful but, of course, it’s not enough. Collective defense is better than individual defense.”

Charney said that Microsoft began to see parallels between the public heath model and Internet security issues in that both require education, prevention and treatment practices. In the health model, doctors educate people on the risks associated with different diseases, take efforts to detect health problems and, ultimately, treat ailments.

“We looked at this model and asked, ‘Why can’t we do this differently and a little more aggressively on the Internet?’” said Charney.

An Internet ‘”public health model” is one in which individuals are educated about the risks associated with the Internet; encouraged to take precautions, such as building firewalls and using antivirus software (much like washing your hands during flu season), and “treated” when they are infected, through programs like Microsoft’s malicious software removal tool.

Companies and individuals need to be “more proactive about machine health,” according to Charney.

Internet threats, just like diseases, are continually spreading. The latest concerns are with cloud computing security, hacking and privacy breaches. Attacks happen in “nanoseconds,” said Charney, and require immediate action.

“We don’t need a cyber security strategy, we kind of need four and the reason for that is you have to go back and think about what the threat is,” he said. “There are many malicious actors on the Internet and they have many different motives... but techniques are often the same.”

Other speakers at RSA include Bill Clinton, founder of the William J. Clinton Foundation and 42nd President of the United States; William Lynn, deputy secretary of defense; and Keith B. Alexander, commander of U.S. Cyber Command and director, national security agency/chief, Central Security Service (NSA/CSS (News - Alert)).

Author name - Carrie Schmelkin 
Resource http://dns.tmcnet.com/topics/internet-security/articles/145608-microsoft-calls-collaborative-defense-against-internet-threats.htm

Symantec Releases Norton 360 version 5.0

Symantec today released version 5.0 of its Norton 360 suite, which it calls "the industry's fastest, most effective all-in-one security suite." Janice Chaffin, president of Symantec's Consumer Business Unit, summed it up thus: "We've designed the latest version of Norton 360 to give consumers an easy-to-use, all-in-one suite that provides the utmost protection and won't slow down their PC."

While its user interface differs, Norton 360 offers all of the same protective technologies as PCMag Editors' Choice Norton Internet Security 2011. Among these are: SONAR 3 protection, which detects and eliminates threats based on behavior; Insight, a technology that uses reputation and statistics to block never-before-seen newest threats; and Norton Bootable Recovery Tool, a bootable antivirus feature that can clean a computer even when malware has rendered it unbootable.


Version 5 adds the Norton Control Center to Norton 360. This component, already seen in Norton Internet Security 2011 and Norton AntiVirus 2011 offers a direct view into Norton Safe Web, Norton Online Family, and the new Norton Cybercrime Index, also released today.

Norton 360's backup and tuneup features are what make it a mega-suite, and Symantec promises enhanced performance in both areas. Backup and restore operations are quicker, and the backup system now offers a better indicator of its progress.

Norton 360 version 5.0 is available directly from Symantec and also from major online and brick-and-mortar retailers. Its $79.99 price includes three licenses and 2GB of online storage. For $99.99 users can upgrade to the premium edition, which features 25GB of online storage (up from 10GB with version 4). All users with a current Norton 360 license are eligible for a free upgrade. PCMag will publish a review once our exhaustive tests have been completed.


Resource Link : http://www.pcmag.com/article2/0,2817,2379855,00.asp


Thursday, February 10, 2011

Antivirus Software: To Pay or Not To Pay?

Experts agree that the Internet is chock full of online dangers, such as malware, viruses and hackers who aim to separate you from your personal information. But name-brand antivirus software can set you back $40 to $70 or more a year. Should you opt for excellent free antivirus protection or stick with the tried-and-true antivirus experts?

  To buy or not to buy? That is the question. When it comes to anti-virus software for your computer, most experts agree you need it if you have the Windows operating system and often go online, where dangers lurk.
But name-brand software could set you back $40 to $70 or more a year. Alternatively, some excellent products are available for free. 

What's a prudent consumer to do? 

The short answer is that if you refuse to pay for computer protection software, at least use a free product in lieu of nothing. On that, experts agree.
Beyond that, it's difficult to generalize with so many products available. But the difference basically comes down to this: Free software will help you discover a problem, such as a virus, and deal with it. Paid software has more features that might help keep you from getting a problem in the first place, especially if you're inexperienced online or visit risky Web sites. Here are some considerations.
FREE SOFTWARE: Popular free products include Avira AntiVir Personal, AVG Anti-virus Free Edition, Avast! Free Antivirus and Microsoft 's own Security Essentials. Be aware that the many free products, while good at what they do, are essentially a marketing tool to persuade you to buy the same brand's paid version. Microsoft is an exception. It has no upsell. 

Some reviewers claim the free anti-virus software might be all you need. Consumer Reports, for example, says that free products are "fine for most people." 

"The best of the free products in terms of malware perform on par with the best paid suites that we've tested," said Paul Reynolds, Consumer Reports' electronics editor. "Even where they are a shade below in performance against some kind of Net threats, it's still sufficient performance for most people."
PAID SOFTWARE: Experts are quick to point out that you are likely to get broader protection and functionality using security  software that you pay for. The free versus paid discussion is "an artificial wall," said Dan Nadir, senior director of product management for Norton security software, a paid product. "There is this perception you can get an apples-to-apples free version with a free product; it's not true," he said. "I think the way users should think about this is that if you're going online, you should get a paid product -- even the free guys have paid products."


Read Full Story Here -- http://www.newsfactor.com/news/Antivirus-Apps--To-Pay-or-Not-To-Pay/story.xhtml?story_id=020001ZSUD6W