Friday, December 12, 2008

AntiVirus free to Mac Users.

New anti-virus software that clears almost all possible threats against the Mac OS X operating system specifically.

Unlike other Mac security products PC Tools' iAntiVirus is different due to its unique feature which does not specially contain any unwanted information about Windows-based threats making sure that this product is phenomenal and its memory footprint and system resource usage is kept to a minimum.

Pc Tools also claimed for this product to have minimum of system impact as it works at its own without much user interference and is designed to work silently in monitoring mode and also functioned to detect and remove threats automatically. At the same time a small window keeps you informed about threats and the action taken against it. Also the interface is very user friendly and functional to make the scans and carry actions against the scan results.

 
The best feature is that this software protects a Mac in real time and moves detected infections automatically to quarantine which allows to view them and restore any files which may be important to you. Also an alert is flashed at the system menu bar to inform the user about any detected infection.


The all new added feature in iAntiVirus is the Smart Update Function which enables the user automatically keeps the software updated as well as automatically notifies about any new necessary enhancements and installs it automatically all through the Smart Update Function. 

Threat signatures are also updated automatically within hours of a high-risk malware outbreak to protect your Mac from the latest online threats.

 

Tuesday, December 9, 2008

beware of Fake antivirus scam

PC Security experts are worried of a new fake anti-virus software scam in circulation.

A rogue program called VirusRemover 2008 has been spotted by Trend Micro who warned that though the hoax uses similar tactics to previous security program scams, the criminals behind it have tried to disguise it.

"Virus Remover 2008 seems to have distanced itself from the Windows-looking interface,"
said Jovi Umawing of Trend Micro.

The program, which can be found when searching the web for 'free anti-virus' or a similar term, scans your PC and then brings up warnings that it is infected with a virus.

Wednesday, November 26, 2008

Norton plays Gaming Mode in Norton AntiVirus 2009 Gaming Edition

Symantec on recently released o Norton AntiVirus 2009 Gaming Edition. Designed for online gamers it maintains full-scale antivirus and antispyware protection without interrupting game play.

The great thing about it is Gameing mode is activated automatically when a full-screen program is active, and hence it also avoids interrupting presentations and movies.Gaming Edition is available at $39.99 with the cost same as the non-gaming edition.

Norton AntiVirus 2009 already has what's called Silent Mode, which suppresses alerts and notifications. And NAV 2009 already runs background tasks only when the system is otherwise idle. The difference between Silent Mode and the new Gamer Mode is one of control. Gamer Mode additionally lets the user suppress Advanced Protection, Intrusion Prevention, and Automatic LiveUpdate. It can even turn off antivirus protection entirely, though of course this isn't recommended.

The other big difference is in the user interface. All the same controls are present as in the non-game edition, but the main window has a rugged, war-torn appearance that Symantec hopes will appeal to gamers. And naturally it offers the same lightweight resource usage as the non-gaming edition. According to Symantec it "installs in under a minute, uses less than 6 Mbytes memory, adds less than 1 second to boot time and averages scans in less than 35 seconds".

Thursday, November 13, 2008

Antivirus softwares needs protection for themselves

Even the computer’s guardian can serve as a trojan. After phishing, pharming and vishing, security experts have discovered that malware is increasingly spreading through the very device that is used as a safeguard against it — the antivirus software. Users don’t suspect that their antivirus software can also be compromised.

iViz, an information security company, has detected multiple vulnerabilities in commonly-used antivirus software, which make the software susceptible to hacking.

Bikash Barai, CEO, iViz, said: “A hacker can send a mail with an infected file and while processing it, the antivirus software can be compromised.”

Read more...

Fix the threats that your antivirus software missed

Prevx finds and fix threats that your current security products missed.
Prevx fixes root kits, spyware, information stealers, trojans, viruses, bots and adware.

Prevx CSI is a powerful new security tool that will quickly and easily tell you if your PC has been infected by one of these new threats. It is easy to use and enabling you to check if your PC has active spyware or malware, and it takes less than two minutes. So why take the risk, check your PC now with Prevx CSI.

If you like Prevx CSI it is useful to keep on your PC or on a USB memory stick. Then you can use it as often as you like to check if your PC has been infected. Also, pass it on to your friends, that way we can all reduce the risk of our PCs infecting others.

Sunday, October 19, 2008

Enrolling in Enhanced Security Online Banking

How to get started? The first step is to enroll in Enhanced Security by following one of the two enrollment options.


Enrolling at prompt when logging into Online Banking: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place secure coookies on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit .

What happens after my account is enrolled? On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and password. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization.

A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the organization—corporate security departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systemsg: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place secure coookies on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit
What happens after my account is enrolled?On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and password. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization. A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the organization—corporate security departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. All banks uses secure dedicated server to store their website data these dedicated servers must be secure servers i.e. they should have best antivirus softwares running on & most secure SSL certificates must be installed on the server.

This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systems

Security need for fincanical institutions

Your online security has always been concern for banks. That’s why a new feature for Online Banking, Enhanced Security, is so important. The new security service is free, easy, and most importantly gives you extra protection from fraud and identity theft.

Enhanced Security is a superior security technology that protects your accounts from unauthorized access. It identifies you as the true “owner” of your accounts by recognizing not only your password but your computer as well. If we don’t recognize your computer – you’ve logged in from a public computer or one you haven’t used before– we’ll ask you to answer your Challenge Questions as an additional line of defense to prevent unauthorized access. With Enhanced Security, you’ll be protected from whatever computer you’re using, whether you’re at home or on the go.

Enhanced security is designed to: Defend against identity theft and fraud. Provide security from any computer, wherever you are. Make it easy for you to bank online anytime, anywhere. To protect all of our members’ accounts, Enhanced Security will be required on all Online Banking accounts starting December 6, 2006. Enhanced Security meets requirements outlined by the FFIEC, a federal governing agency for financial institutions. The agency has mandated that all financial institutions have additional security in place as soona as possible. The security changes are for the benefit of members by ensuring that their confidential account data is protected from would be hackers.

Friday, October 10, 2008

Symantec acquired MessageLabs for £401.2m

Antivirus software expert Symantec has gone on a buying spree.

Symantec is to extend its online messaging security services offering with the acquisition of MessageLabs for around £410m.

MessageLabs has more than eight million end-users in more than 19,000 organisation, ranging from small businesses to Fortune 500 companies.

MessageLabs email filtering services cover much the same technological function as Brightmail spam filtering appliances, another Symantec acquisition. "I'm not concerned at all that we can have Brightmail on premise and MessageLabs, and that the two will work with each other," Thomspson said.

CEO of MessageLabs Adrian Chamberlain said"Joining with Symantec we can leapfrog into new markets we might not have been able to access for years. In addition there's the potential for us to develop Symantec protection products as an online service, expanding the portfolio, as well as creating a potential to cross-sell existing products."

Subject to regulatory approval, the firms hope the deal will be completed by the end of the year.

Tuesday, October 7, 2008

Microsoft® Internet Security and Acceleration (ISA) Server 2006

Microsoft® Internet Security and Acceleration (ISA) Server 2006 provides controlled secure access between networks, and serves as a Web caching proxy providing fast Web response and offload capabilities, as well as secure Web publishing for remote access. Its multiple layered architecture and advanced policy engine provide granular control of the balance between the level of security you need and the resources that are required. As an edge server connecting many networks, ISA Server handles large amounts of traffic compared to other servers in an organization. For this reason, it is built for high performance. This article provides guidelines for deploying ISA Server with best performance and adequate capacity.


Executive Summary
In most cases, the available network bandwidth and especially that of the Internet link can be secured by ISA Server running on available entry-level hardware. A typical default deployment of ISA Server securing outbound Web access for Hypertext Transfer Protocol (HTTP) traffic requires specific hardware configurations for various Internet links. These hardware configurations are shown in the following table. (For details, see Web Proxy Scenarios in this document.). For better speed & security, host your website on Dedicated server in India.

Sunday, October 5, 2008

Antivirus news - Oct,5

Athletics Win With Antivirus
RedOrbit, TX - Oct 5, 2008
"Penn State works like most education institutions with a focus on best-practice results from any software purchases, while adhering to a tightly managed (more)



ZoneAlarm Internet Security Suite 2009 - ZDNet Asia
ZoneAlarm Internet Security Suite 2009
ZDNet Asia, Asia - Oct 5, 2008
To find out how we test antivirus (and now Internet Security suite) software, see CNET Labs' How we test: Antivirus software page(more)


The School of Hacking
Newsweek - Oct 5, 2008
Their professor, George Ledin, has showed them how to penetrate even the best antivirus software. Ledin insists that his students mean no harm,(more)

Kaspersky debugs critical bugs in antivirus its products

Antivirus vendor Kaspersky has released Maintenance Pack 2 for Kaspersky Anti-Virus 6.0 and Kaspersky Internet Security 6.0 to close a number of security holes, some of which are critical. For instance, attackers can exploit flaws in the installed ActiveX controls AxKLProd60.dll and AxKLSysInfo.dll to download or delete files from a victim’s computer. This is also possible with the ActiveX control SysInfo, which allows an FTP transfer to be launched on the user’s computer without authentication and without prompting the user. In all three cases, however, the victim first has to visit a malicious website using Internet Explorer. While the Maintenance Pack does remedy the holes, it does not do so by correcting the flaws, but instead deletes the vulnerable controls during installation.


In addition, two heap overflows have been found in Kaspersky products. One of them can be triggered by specially prepared ARJ Archives in an on-demand scan: the scanner can be brought down and code injected and launched. The other overflow is the result of a flaw in the hook function of the driver klif.sys which can be exploited to execute code with kernel privileges. According to the experts at security service provider iDefense who made the discovery, these holes are very difficult to exploit. Finally, yet another flaw in this driver allows programs to be executed with the highest privileges (ring 0). The flaws have been remedied in build 6.0.2.614.


Users are advised to download and install the product updates as quickly as possible.

Sunday, September 7, 2008

Best antivirus practises..

use it - i don't just mean have it installed, i mean sit down and actually scan things (like files you download or removable media you insert into your computer) from time to time (and scanning the entire drive on an automated schedule doesn't count)... install and forget security is bullshit... you need to interact with the software, to learn what it's alerts actually look like so you can distinguish them from fake alerts, and to become skilled in the actual use of the tool...

some may say that's working for your security software instead of making it work for you and real people have real jobs to do, but it doesn't actually take much time or effort to scan incoming materials and both of those other concepts ('working for the software' and 'making it work for you') are nonsense... it's a tool, and like any tool you can only get out of it what you put into it... if you don't know how to use it properly then you ultimately won't do as good a job at protecting yourself with it as you might have otherwise... it's a poor craftsman who blames his tools...

keep it up to date - known-malware scanners are only as good as the knowledge-base they embody... new malware is being created at a rather incredible rate and the only way to make known-malware scanners effective against that new malware is to update those scanners with 'knowledge' of that new malware...

sure there are other types of anti-malware software that don't require such updates, but they also don't come with expert knowledge about known-malware built into them and so are of little diagnostic value when prevention inevitably fails... also, it's always easiest to prevent something bad if you 'know' specifically what to look for...

quarantine first - don't trust the scanner to automatically delete things it thinks are bad... scanners make mistakes and you don't want to compound those mistakes by allowing the scanner to automagically delete critical files...

trust the results enough to consider that the file(s) in question may be bad, but verify those results, and verify that it's safe to get rid of the file(s) before you actually do so... trust but verify...

don't rely on it alone - just as you shouldn't place absolute trust in it's results when it detects something you also shouldn't place absolute trust in it when it doesn't find anything... this is probably the best practice most directly in conflict with av marketing, and there are a number of people i really wish would stop listening to marketing and catch up because i learned of the benefits of using a multi-layered approach (what would be better known now as defense in depth) back in the early 90's thanks to the people who actually made (rather than marketed) this stuff...

you need to use other types of anti-malware technology in conjunction with scanners (not just additional scanners) if for no other reason than because there will always be a window of time between when a new piece of malware is created and when an update for that malware is made available... in other words: if the malware's too new, a scanner won't do...

scan from a known-clean environment - just as you shouldn't necessarily trust the scanner you also shouldn't trust an infected or even possibly infected machine... this likely won't seem intuitive since the av industry itself has for years been producing features and services that contradict this such as web based scanners or the ubiquitous scheduled system scan... in an effort to be less of an uncompromising s.o.b. let me say that those are features and services that are offered for convenience and shouldn't be solely relied upon as they do not replace outside-the-box scanning...

you can't trust a compromised environment to accurately report it's own integrity... the code the runs first wins and the only way to make sure malware doesn't run first is to operate in an environment where no code from the suspect system has run; not the operating system, not even the boot sectors...
source:- anti-virus-rants.blogspot.com

Monday, July 28, 2008

BEST ANTIVIRUS SOFTWARE PRODUCTS

There is always lot of discussion about Best AntiVirus software. everyone want to know which is the best anti virus software. So here is a list of top antivirus softwares.


2007 BEST AntiVirus software:

Golden:BitDefender AntiVirus
Silver:Kasperskyantivirus
Copper:F-Secure Anti-Virus
04:PC-cillin AntiVirus
05:ESET Nod32
06:McAfee VirusScan
07:Norton AntiVirus
08:AVG Anti-Virus
09:eTrust EZ Antivirus
10:Norman Virus Control
11:AntiVirusKit
12:AVAST! AntiVirus
13:Panda Titanium
14:F-Prot

These were the most popular best antivirus softwares in the world. To check more i suggest you to check
best-antivirus-software.org.
best-antivirus-software.org is an organisation which provides unbiased reviews & insights about top anti virus products.

Free Antivirus Software

If you want a good free anti-virus, then I reccomend Avast Home Edition, which is free as long as you register with them (a simple process).

Avast is easy to use, has a simple interface, a good virus database updater, and constantly scans your computer with it's resident shield, providing protection even for software such as Windows Live Messenger, AIM and Limewire.
Beat free anti-virus i've found around.

Avast anti-virus software : avast.com

Also, if your planning to get an anti-virus, i suggest you might want to get a good firewall too. I currently use comodo, a really good free firewall, that although touchy at times, displaying just about everything as a threat (including windows proccesses that are completely legitamised), but eventually it'll grow to allow these. If you plan to start using it, remember to let through any program you know is installed on your computer, and to tick the "remember this next time" box, so that next time it will automatically give that program access.

Comodo Firewall software: http://www.personalfirewall.comodo.com/


For an anti-spyware solution, the best i've found is Spybot: Search and Destroy, which about on par with AVG Anti-Spyware, also free. Spybot is good, as it has a very large malware and spyware database, and scans in a reasonably small amount of time. It contains an internet explorer scanner, which automatically scans IE while you're using it, and an advanced menu view hich gives you a lot of options about your computer, scanning, and etc.

Spybot: http://www.safer-networking.org/


Remember to always update your anti-virus software and anti-spyware software to ensure they work well!

Friday, June 27, 2008

Getting spyware-free RealPlayer through the BBC

An anonymous reader sez, "The BBC made a unique deal with Real Networks which disposes of their spyware tactics. Basically, if a user clicks on a link to download Real Player from a BBC website, the referrer script sends them to a page where they can download an expiry-free, spyware-free and nuicance-free version of the player. It's because the BBC have such a stringent public service remit, that it was offensive to charge people a license fee for BBC content, then make them pay all over again for the facility to view/listen to it."
Link-Download Real Player from BBC

Tuesday, June 24, 2008

What is Web Hosting ?

A web hosting company will offer clients access to a server that will provide the clients’ content to individuals on the World Wide Web after they make a URL or domain name request. To view pages on the web, you must have a web browser, such as Microsoft Internet Explorer or Netscape Navigator to request the web page from the server after you have purchased internet access. Hosting companies require that you buy your URL or domain name first before you purchase hosting services. Choosing a perfect web hosting provider needs lot of things to be considered. Though price and affordability is what many people look after, but the search for a proper web hosting provider never ends with money. Most hosting companies have a package that will allow you to buy the domain name and hosting at the same time. For cheap domain Name registration in india,Cheap linux web hosting or cheap windows web hosting in India I recommend you dotcom1234.com.The servers of dotcom1234.com are really fast & reliable.

Monday, June 2, 2008

What is spyware? how to prevent it?

Spyware is computer software that collects personal information about users without their informed consent. The term Spyware, which was coined in 1995 but wasn't widely used for another five years, is often used interchangeably with adware and malware.

Spyware is a tracking software that will get into ur computer through malicious sites or when ur downloading something or thorugh some banners, some of the get execute themselves and some need permission to install.
The work of spyware is to send ur information, id, password, credit card number, ur private information, i.e to stastical data back to particular site or banner advertisers , through this information they can hack ur account or as u know can use ur credit card , etc ...mind it, it is not antivirus :) .. thats why its better to keep away from wire transfers
Read more on spyware-prevention...

Friday, May 30, 2008

Free Antivirus Software

There's no such thing as a free ride, or is there? If you're an experienced user and don't mind putting in a little elbow grease, you can build your own security suite:
# Free Virus Scanners
# ZoneAlarm Personal Firewall
For those who want a more holistic all-in-one solution:
# Top Antivirus Software
# Top Spyware Scanners

Thursday, May 15, 2008

AVG Antivirus 8 0 Pro Edition Final FREE Rapidshare Links for Download

AVG Anti-Virus& Anti-Spyware protection for Windows from the world’s most trusted security company. Use the Internet with confidence in your home or small office. * Easy to download, install and use * Protection against viruses, spyware, adware, worms and trojans * Real-time security while you surf and chat online * Top-quality protection that does not slow your system down * Free support and service around the clock and across the globe * Compatible with Windows Vista and Windows XP Integrated protection * Anti-Virus: protection against viruses, worms and trojans * Anti-Spyware: protection against spyware, adware and identity-theft * Anti-Rootkit: protection against hidden threats (rootkits) * Web Shield & LinkScanner: protection against malicious websites Easy-to-use, automated protection Real-time protection, automatic updates, low-impact background scanning for on-line threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time: * All files including documents, pictures and applications * E-mails (all major email clients supported) * Instant messaging and P2P communications * File downloads and online transactions such as shopping and banking * Search results and any other links you click on Download ->

Avast! Antivirus 4.8.1195 Professional Edition

The professional solution to great protection avast! 4 Professional Edition represents the best antivirus protection avast! 4 Professional Edition comes with anti-spyware, anti-rootkit and strong self-protection built-in. It is designed to protect your valuable data and programs, as well as keep itself up-to-date and has the kind of built-in features that many vendors charge for additionally, or don’t include at all. Simply install and forget. All-inclusive, comprehensive protection avast! 4 Professional Edition includes ANTI-SPYWARE protection, certified by the West Coast Labs Checkmark process, to protect against the latest spyware threats and ANTI-ROOTKIT DETECTION based on the best-in class GMER technology, built in to the scan engine. No additional purchase is required. Simple to use and automated Just install and go. Automatic incremental updates provide real-time protection of your system, including web surfing. We’ve made avast! antivirus as simple to use as possible, while allowing full control of your security. fastddl.com - Fast direct downloadsAvast! Antivirus 4.8.1195 Professional Edition direct downloads.