Follow Us Now

30 December 2011

Confirm your feed

Feed My Inbox - Confirm your feed

Greetings,

You have chosen to receive email updates from the following sites and/or feeds:

detiknews

Confirm Subscription
 
Cancel Cancel Subscription
Create an Account Create Account
 
EMAIL FREQUENCY: DAILY
Updates from this website will be delivered once per day.
 
Want these emails faster?
• Get your emails delivered real-time or every six hours
• Subscribe to 25, 50 or Unlimited feeds
• Plans starting at $4.17/month
 
Upgrade
2 Quick Tips
1. Add updates@feedmyinbox.com to your address book, so that future emails from us don't end up in your spam filter.
2. Once confirmed, you can expect to receive your first update in 24 hours or so if the feed has any entries.
If you have questions, reply to this email for help.
help@feedmyinbox.com
PO Box 682532
Franklin, TN 37068
Add to Cart More Info

12 May 2010

This is the method which could give way All Hack Antivirus


Researchers have found a way of hacking to get away from the protection created by dozens of popular desktop antivirus products, including those offered by McAfee, Trend Micro, AVG, and BitDefender. Methods were developed by researchers at matousec.com security, which works by exploiting existing antivirus program on the Windows operating system. In short, the method works by sending a code sample that passes through their security checks and then, before the code is executed, the exchange with a dangerous payload. Exploitation antivirus program must wait for the right time so that the code is not mixed up too early or too late. However, for systems that work on multicore processors, 'attack' matousec This can occur because a single threat can make other tasks that are run together, become unworkable. As a result, malware protection offered for your Windows PC can be fooled by allowing malicious code to work, which is usually when under normal conditions, will diblock malicious code by an antivirus. The method that is run by matousec use AV software, like SSDT, or the System Service Descriptor Table to modify parts of the operating system kernel, combined with the weakness of the Adobe Reader or Oracle Java Virtual Machine to install malware without being noticed by any antivirus software when users use a PC who become victims. Matousec reported that there were at least 34 security products are potentially affected by this attack. This technique can even work when Windows is run with an account that has limited privileges.
Add to Cart More Info

11 February 2010

Beware, Trojan Infection Can Smart Files in Windows


According to the observation of security firm McAfee Labs has discovered malware that can copy itself in a help file in Windows to make the victim's computer infections. Trojan is called Muster.e by McAfee anti-virus providers, where the Trojan can infect a Windows file named imepaden.hlp who became one of the help file for Microsoft IME. Imepaden.hlp file served as the main component malware storage in encrypted form. However, the help file is already infected can still be viewed with a browser WinHelp, similar to the original help files, and users is quite difficult to find an infection which has occurred from viewing the file. When the malware that is installed be removed, then the secret cargo in it, or the so-called sys file will be decrypted into an executable file named upgraderUI.exe the registry HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVe rsion \ Run AutoPatch, and will run the installation file automatically runs a Windows service.

Muster is a family of backdoor that have used the help file to hide himself. Or help files. GLA is a data file that is designed to be viewed with Microsoft's browser to provide WinHelp online help for applications used by users. File. GLA is decrypted with key Microsoft CryptAPI with a difficult and executed by the loader files. "All the action happens in a hidden. Windows help file tesebut clever enough to fool the user. This Trojan is usually easier to work on the client computer. "Said Craig Schmugar, threat analysts McAfee Labs.
One scenario of this malware technique is a victim not aware of strange files and registry UpgraderUI.exe it, and then the user will delete the files and registry. They'll think have removed a backdoor to success. In fact, when the files and registry files are the same back again and again at every reboot the computer, the user still can not find any other suspicious files. Users will never know that the sys files have been infected, following also imepaden.hlp files.

Meanwhile, from the McAfee, has been to update the McAfee VirusScan DATs 5861 or newer, which can detect and clean infected files and help files of this backdoor.

Add to Cart More Info