London - Consultancy affirms that groups of Europe and of China they arm attacks to reach users that didn't apply correction published by Microsoft.
More than two thousand sites are exploring safety's breach in the lively cursors of Windows, in agreement with to manufacturer of safety WebSense.
The pages or they are accommodating malicious code or they redirect users online for sites with malwares, he/she affirmed the blog of WebSense on this Monday (09/04).
26 de mai. de 2007
Camera-and.net motivates retail to adopt pattern of safety
The Camera of Electronic Trade signs next Wednesday, 18/04, a partnership with Visa, MasterCard and Amex with the objective of motivating the virtual shopkeepers the if they adapt PCI / DSS (Payment Card Industry / it Dates Security Standard), world pattern that establishes rules of safety for electronic payments.
As it informs Ed Menezes, director of safety of the information of Redecard, that processes in the point-of-sales payments with flag Visa, MIS (Movimento Internet Holds) of the Camera-and.net is creating a stamp for the shopkeepers that adopt protection measures. Therefore, the entity will make campaign to motivate their associates to enter in accordance with PCI.
As it informs Ed Menezes, director of safety of the information of Redecard, that processes in the point-of-sales payments with flag Visa, MIS (Movimento Internet Holds) of the Camera-and.net is creating a stamp for the shopkeepers that adopt protection measures. Therefore, the entity will make campaign to motivate their associates to enter in accordance with PCI.
25 de mai. de 2007
Check the ranking of the viruses more assets of the world
The virus more assets of the world is the worm Nyxem. Only in Brazil, they were 1.350 infections in January of 2007, what corresponds to 90% of the index registered in South America.
The worm Nyxem appeared in January of 2006 and he/she disperses for e-mails. With more than 42 thousand registrations, the virus WORM_Nyxem. He was the champion in the list of the ten curses that more they infected computers all over the world in the month of January, according to Trend Micro, company of content safety and administration of threats.
Check the general list:
1 - WORM_NYXEM.E
2 - PE_PARITE.A
3 - HTML_NETSKY.P
4 - WORM_NETSKY.DAM
5 - TROJ_SMALL.EDW
6 - WORM ANIG.A
7 - WORM_RONTKBR.GEN
8 - WORM_MOFEI.B
9 - WORM_NUWAR.CQ
10 - WORM_RONTOKBRO.B
The worm Nyxem appeared in January of 2006 and he/she disperses for e-mails. With more than 42 thousand registrations, the virus WORM_Nyxem. He was the champion in the list of the ten curses that more they infected computers all over the world in the month of January, according to Trend Micro, company of content safety and administration of threats.
Check the general list:
1 - WORM_NYXEM.E
2 - PE_PARITE.A
3 - HTML_NETSKY.P
4 - WORM_NETSKY.DAM
5 - TROJ_SMALL.EDW
6 - WORM ANIG.A
7 - WORM_RONTKBR.GEN
8 - WORM_MOFEI.B
9 - WORM_NUWAR.CQ
10 - WORM_RONTOKBRO.B
24 de mai. de 2007
Microsoft answers new flaws in Office
Microsoft is answering reports that point three new flaws in Office and questioning the form as the vulnerabilities was published, it communicated the company on Wednesday (11/04).
Several sites of safety moderated four new vulnerabilities, three affecting Word 2007, soon after Microsoft to have liberated their monthly corrections on Tuesday. Microsoft alleges that none of the three supposed flaws "demonstrates vulnerability in Word 2007 or any product of Office 2007."
Besides, the company claimed that was not communicated before the breaches if they turn public, a common practice in safety's industry. According to the consultant of Sophos, Graham Cluley, at least two of the sites in subject already published flaws in the past without notifying the suppliers.
Two of the flaws supposedly allow an attack that creates similar conditions to caused them by attacks of service denial, with CPU reaching 100% of use, according to the site Security Vulnerabilities. The third vulnerability can allow remote execution of code, and Wednesday, that is linked to the extension ".hlp" for files of help of Windows, can take the a condition of blowout of pile of tasks, according to the site.
Several sites of safety moderated four new vulnerabilities, three affecting Word 2007, soon after Microsoft to have liberated their monthly corrections on Tuesday. Microsoft alleges that none of the three supposed flaws "demonstrates vulnerability in Word 2007 or any product of Office 2007."
Besides, the company claimed that was not communicated before the breaches if they turn public, a common practice in safety's industry. According to the consultant of Sophos, Graham Cluley, at least two of the sites in subject already published flaws in the past without notifying the suppliers.
Two of the flaws supposedly allow an attack that creates similar conditions to caused them by attacks of service denial, with CPU reaching 100% of use, according to the site Security Vulnerabilities. The third vulnerability can allow remote execution of code, and Wednesday, that is linked to the extension ".hlp" for files of help of Windows, can take the a condition of blowout of pile of tasks, according to the site.
19 de mai. de 2007
French Hacker finds imperfections in popular programs
French hacker nicknamed Marsu divulged two demonstrations for exploration of imperfections of popular programs: between them the publishers of Photoshop image, the Adobe, and Paint Shop Pro, of the Corel, beyond the popular tocador multimedia Winamp, of the Nullsoft (division of the AOL).
Microsoft corrects 19 imperfections in softwares
The Microsoft published seven bulletins of security in this tuesday, 8 of May, referring ones to the monthly program of updates “Patch Tuesday”. To all, had been 19 vulnerabilities decided in applicatory and the systems of the company.
Pendrive is the biggest threat to the security of companies
A research carried through for the desenvolvedora Centennial Software discovered that, currently, the responsible ones for the sectors of YOU of the companies more are worried about removable memories of what with virus and spyware.
In accordance with the site The Register, a carried through research this year in the fair Infosecurity Europe, carried through in London, indicated that of the 370 technician interviewed 38.4% had classified devices USB of removable media (pendrives and tocadores of MP3, for example) as the main concern how much to the security in its company.
But 23.7% of the interviewed ones deposit in the viruses its bigger concern, and others 22.3% find that spywares and others malwares in general are more dangerous.
Currently 80% of the company do not possess efficient procedures of security for these cases. In passed July, this problem was pointed by another study of the firm of enterprise consultoria Deloitte, that indicated an increase of 50% in security breaches, having been half of internal them, what it was related to the increasing popularity of the devices of portable media.
In accordance with the site The Register, a carried through research this year in the fair Infosecurity Europe, carried through in London, indicated that of the 370 technician interviewed 38.4% had classified devices USB of removable media (pendrives and tocadores of MP3, for example) as the main concern how much to the security in its company.
But 23.7% of the interviewed ones deposit in the viruses its bigger concern, and others 22.3% find that spywares and others malwares in general are more dangerous.
Currently 80% of the company do not possess efficient procedures of security for these cases. In passed July, this problem was pointed by another study of the firm of enterprise consultoria Deloitte, that indicated an increase of 50% in security breaches, having been half of internal them, what it was related to the increasing popularity of the devices of portable media.
17 de mai. de 2007
Plague uses component of the Windows Update
A new Trojan virus, baptized of TrojanDownloader: Win32/Jowspry, if bases on the component Background Intelligent Transfer Service (BITS) to lower modules of malware. In accordance with the site heise Security, the BITS is the used component so that the tool Windows Update functions with perfection, but brings a bigger easiness to the insertion of malicious modules.
Previously, so that a virus inserted new codes in the computer of its victim, it was necessary that any type of protection firewall was incapacitated automatically; applicatory imperfections in as navigating, for example, were used or despite privileges of access to the net were gotten by the malicious program. According to blog of the Symantec, the virus was discovered by the German analyst of security Frank Boldewin, who verified the way of operation of a virus propagated in Germany saw Spam in the end of March of 2007.
Previously, so that a virus inserted new codes in the computer of its victim, it was necessary that any type of protection firewall was incapacitated automatically; applicatory imperfections in as navigating, for example, were used or despite privileges of access to the net were gotten by the malicious program. According to blog of the Symantec, the virus was discovered by the German analyst of security Frank Boldewin, who verified the way of operation of a virus propagated in Germany saw Spam in the end of March of 2007.
Horse-of-Troy steals passwords and publishes in web
A horse-of-Troy of the type thief of passwords collects information confidential and sends for an open site. Result: these data appear when a search becomes.
The discovery was made by a researcher of the Symantec.It counts that he was studying the horse-of-Troy Infostealer.Snifula.C, that if he installs in microns, steals given sensible and sends them for one definitive site. According to researcher, the objective of the author of the worm would be certainly to gain money with these information.
But the problem is that the site where the data are collected does not have access control. Then 300 MB of stolen data - names, addresses, numbers of telephone and credit card, logins, access the banks - were free in the Internet. Therefore, in a search made in the Google or another mechanism of research, these data can appear.
Certainly the idea of the responsible one for horse-of-Troy was not to publish the information. This must have occurred for accident. However, they are there, for desperation of the victims.
The discovery was made by a researcher of the Symantec.It counts that he was studying the horse-of-Troy Infostealer.Snifula.C, that if he installs in microns, steals given sensible and sends them for one definitive site. According to researcher, the objective of the author of the worm would be certainly to gain money with these information.
But the problem is that the site where the data are collected does not have access control. Then 300 MB of stolen data - names, addresses, numbers of telephone and credit card, logins, access the banks - were free in the Internet. Therefore, in a search made in the Google or another mechanism of research, these data can appear.
Certainly the idea of the responsible one for horse-of-Troy was not to publish the information. This must have occurred for accident. However, they are there, for desperation of the victims.
16 de mai. de 2007
15 de mai. de 2007
11 de mai. de 2007
Netsky was the worse virus of December
The Netsky virus appeared for the third consecutive month as the worse threat for users of computers, disclosed to a rocking carried through for the company of Trend security Micron.
Cellular they start to be white of virus authors
Full "intelligent" cellular telephones of resources are if showing so donkeys how much personal computers when it is treated to prevent virus. Crackers can, for example, search personal information and agendas or transform the cellular one into a listening device to hear the colloquies of other users. Viruses that if spread for air arrive without acknowledgment and are capable to total disactivate the functions of the devices.
9 de mai. de 2007
VIRUSES THAT HAD MARKED the internet
1988- the American Robert Morris creates the Morris Worm, that is the first virus if to propagate automatically large-scale.
1991- o vírus Tequila, que é polimórfico, ou seja, muda de formato para enganar os programas de proteção.
1999- the Chen Chinese Ing-hau admits to have bred the Chernobyl virus. Proncipal threat: the plate-mother!
2000- virus I Love You if spreads over email causing great congestions. The Onel Phillipino of 23 years is imprisoned and set free, therefore he did not have laws against hackers.
2001- the dutch Jan de Wint, 220 years, is condemned to fulfill 150h of servicos for creating the virus Ana Kournikova.
SirCam, Nind and Code Red use the resource of automatic propagation to congest systems of emails and to take off sites of air!
2002- David Smith, 34, was condemned the 20 months of arrest and to the payment of a fine of USS 5,000 for creating the Melissa virus.
2003- the Slammer virus obtains to penetrate in the backbone network of the nuclear plant Besse Davis, in U.S.A.. As the plant was disactivated nothing it happens.
he Blaster virus if propagates for the InterNet in search of vulnerable computers causing the paralyzation of trains in Washington and delays in the airport of Toronto!
2004 - 100 a thousand known viruses the Sasser took off the sleep of much people: it contaminated the users without whom they needed to make nothing! It explored imperfections in win 2000 and XP. A battle also was stopped by the gangs of the Netsky and the Bagle, that had created as many variants that they had depleted the alphabet. Another one that caused terror was the Mydoon, that uses techniques of social engineering. In one hour it contaminated 115 a thousand machines and it caused much slowness in the net.
1991- o vírus Tequila, que é polimórfico, ou seja, muda de formato para enganar os programas de proteção.
1999- the Chen Chinese Ing-hau admits to have bred the Chernobyl virus. Proncipal threat: the plate-mother!
2000- virus I Love You if spreads over email causing great congestions. The Onel Phillipino of 23 years is imprisoned and set free, therefore he did not have laws against hackers.
2001- the dutch Jan de Wint, 220 years, is condemned to fulfill 150h of servicos for creating the virus Ana Kournikova.
SirCam, Nind and Code Red use the resource of automatic propagation to congest systems of emails and to take off sites of air!
2002- David Smith, 34, was condemned the 20 months of arrest and to the payment of a fine of USS 5,000 for creating the Melissa virus.
2003- the Slammer virus obtains to penetrate in the backbone network of the nuclear plant Besse Davis, in U.S.A.. As the plant was disactivated nothing it happens.
he Blaster virus if propagates for the InterNet in search of vulnerable computers causing the paralyzation of trains in Washington and delays in the airport of Toronto!
2004 - 100 a thousand known viruses the Sasser took off the sleep of much people: it contaminated the users without whom they needed to make nothing! It explored imperfections in win 2000 and XP. A battle also was stopped by the gangs of the Netsky and the Bagle, that had created as many variants that they had depleted the alphabet. Another one that caused terror was the Mydoon, that uses techniques of social engineering. In one hour it contaminated 115 a thousand machines and it caused much slowness in the net.
It removes dangerous viruses
It uses a feramenta that removes virus, trojans and variants.
http://download.nai.com/products/mcafee-avert/stinger.exe
Good Luck :)
http://download.nai.com/products/mcafee-avert/stinger.exe
Good Luck :)
University gives to courses of Spam and spyware
The Canadian university of Calgary is creating controversies in the market of security when announcing the inclusion of the Spam course and spyware in the department of Computer sciences, from the third trimester of this year.
Adolescent confesses creation of the Sasser virus
The young that is being judged for the creation of the virus of Sasser computer, that caused problems the great companies and people of the whole world in the passed year, admitted responsibility in all the accusations. Katharina Kruetzfeldt, female judge of the court of Verden, city in the west of Germany, said that Sven Jaschan, 19 years of age, admitted guilt in relation to accusations of manipulation of data, sabotage of computers and interference with public communications, in one of the biggest attacks of this type to the internet.
8 de mai. de 2007
Test if its micron has Virus
For a fast tracking!
Its free!
http://security2.norton.com/br/home.asp?j=1%0F%22uctid=symhome&plfid=20)#id=br&venid=sym&pkj=LPVVQLNCWKZYUBXRQOG
Good Luck!
Post your comment!
Its free!
http://security2.norton.com/br/home.asp?j=1%0F%22uctid=symhome&plfid=20)#id=br&venid=sym&pkj=LPVVQLNCWKZYUBXRQOG
Good Luck!
Post your comment!
List of the last joined viruses
http://www.symantec.com.br/region/br/avcenter/vinfodb.html
Good Luck!
Good Luck!
7 de mai. de 2007
Evaluation of Antivírus
The Best Antivirus:
1: BitDefender
2: Kaspersky
3: F-Secure Anti-virus
Learn more:
http://anti-virus-software-review.toptenreviews.com/?ttreng=1&ttrkey=anti-virus
1: BitDefender
2: Kaspersky
3: F-Secure Anti-virus
Learn more:
http://anti-virus-software-review.toptenreviews.com/?ttreng=1&ttrkey=anti-virus
6 de mai. de 2007
Ewido Anti-Malware
This Anti-Malware is sufficient complete with resources to detect Some plagues as Hijackers, Spywares, Worms, Dialers, Trojans Keyloggers.
Download here:
http://download.ewido.net/ewido-setup.exe
Good Luck!
Download here:
http://download.ewido.net/ewido-setup.exe
Good Luck!
Welcome all :)
Good night to all!
Here I go to place as you must prevent its computer of hackers, virus and spywares!
As if to exempt badly of 1 object in its computer!
Good Luck!
Here I go to place as you must prevent its computer of hackers, virus and spywares!
As if to exempt badly of 1 object in its computer!
Good Luck!
Assinar:
Postagens (Atom)