Anti-virus computer protection | Share experiences on setting up, get rid of the virus, discussing ...



Rep: (2178)

Catalog of antivirus solutions
Additionally


Post has been editedstp101 - 21.04.18, 13:16
Reason for editing: New header. Rammsteiner cap tweaked



Rep: (2178)
Panda products

Of.sayt
Panda Internet Security 2010
Panda Internet Security 2010 18.0.0 is a comprehensive security solution that gives you complete protection against all types of Internet threats. It protects you from viruses, spyware, rootkits, hackers, online fraud, identity theft and all other Internet threats.

The anti-spam engine will keep your inbox free from junk mail while the Parental Control feature will make use of the Internet safe for your family. With the new Collective Intelligence technology, the solution is now much faster than previous versions.
anti-malware engine
Automatically detects and eliminates all types of viruses, spyware, trojans, rootkits, bots and other malware. Before they infect your PC.
  • NEW! Panda USB Vaccine protects your USB-device infections.
  • IMPROVED! 80% reduced memory consumption.
  • IMPROVED! Scans files in real time and on demand.
  • IMPROVED! Scans emails before they reach your inbox, regardless of your email client.
  • IMPROVED! Scans Internet traffic regardless of your browser.
  • IMPROVED! Scans traffic instant messengers (IM), for example, such as MSN Messenger, Windows Live Messenger, Yahoo Messenger and AQL.
  • IMPROVED! It removes all traces left by spyware on your PC.

Advanced Proactive Protection Technologies
from Panda Security are widely recognized as the most effective against new and unknown threats.
  • NEW! New technologies include detection of genetic signatures and remote genetic scan "of the cloud."
  • IMPROVED! Genetic Heuristic Engine (Genetic Heuristic Engine) includes the latest algorithms to detect the most dangerous malware families.
  • IMPROVED! TruPrevent 2.0 analyzes the behavior of programs and blocks potentially dangerous for your PC files. This last line of defense blocks the attack, "zero-day" and destroys any malicious activity that has evaded traditional protection systems.

personal firewall
It protects you against Internet-borne worms and hacker attacks.
  • IMPROVED! Smart auto-configuration allows good programs to run through the filter, while malware is blocked.
  • IMPROVED! It protects your PC from hackers on the Internet.
  • WiFi-Monitor protects your wireless network from intruders.
  • IPS blocks known and unknown hacker attacks using vulnerability of the system.

Identity Theft Protection
Anti-Rootkit Technology
IMPROVED! Detects and removes silently-installed rootkits used by malware or hackers to evade traditional antivirus products.
Anti-Phishing Filter
Recognizes fraudulent email and protects you from scams pristupnikov.
Anti-Banking Trojans
Detection of the most dangerous malware to steal personal data, which is used by cyber-criminals to steal banking credentials. Specialized heuristics and generic detection techniques ensure maximum protection for online transactions. NEW!
Safe Internet Browsing
Web-filtering
IMPROVED! It allows you to use the Internet safely without the risk of infections, vulnerability exploits, browser hijacking or phishing websites. By analyzing website content, links and Web reputation scores, Panda Security provides protection against all types of Internet threats and scams.
Personal Information Filter
IMPROVED! It provides protection of personal user data, such as credit card numbers, social security numbers and any other personal information you define.
Anti-Spam filter
Keeps your inbox free from junk mail. With the new spam engine, which detects more than 97% of spam, you're assured of continuous work service and delivery of precisely those messages that you need.
Parental control
It lets your children browse the Internet safely by blocking access to sites with information about violence, sex, or racist content, as well as other inappropriate websites. The interface allows you regardless of the type of browser used to create a set of filters for different user groups (children, adolescents, staff, etc.) or customize filter rules according to your specific needs.
Backup and Restore
Safeguards your most important files against accidental loss or damage. It prevents loss of important documents due to problems with the hard drive, accidental deletion or other accidents. backup and recovery of files from your hard drive, CD, DVD, other external media or online are both extremely simple and easy.
NEW! Includes online booking up to 2 GB.
Safeguards your most important files and allow access to them anytime, anywhere. This ultimate safety layer provides 2 gigabytes of free, secure space

Download:


Panda Antivirus Pro 2009
The new Panda Antivirus Pro 2009 is the most easy and intuitive-to-use security solution for home PC. After installing the software, the user can forget about viruses, spyware, rootkits, hackers, online fraud, and no longer worry about the safety of confidential information. Thanks to the new Collective Intelligence technology is now much faster than previous versions.
Anti-malware system
Automatically detects and eliminates all types of viruses, spyware, trojans, rootkits, bots and other malware. Before they infect your PC.
  • Scans files in real time and on demand.
  • Scans emails before they reach your inbox, regardless of your email client.
  • Scans Internet traffic regardless of your browser.
  • It provides protection for the type of IM communications, such as MSN Messenger, Windows Live Messenger, Yahoo Messenger, AQL, ICQ and others.
  • It removes all traces of clutter left by spyware on your PC.

Advanced Proactive Protection Technologies
from Panda Security are widely recognized as the most effective against new and unknown threats.
Genetic Heuristic Engine (Genetic Heuristic Engine) includes the latest algorithms to detect the most dangerous malware families.
Second generation technologies TruPrevent 2.0 analyzes the behavior of programs and blocks potentially dangerous files. TruPrevent Technologies provide protection against targeted attacks and attacks, "zero-day" (the attack of the new malware that has not yet studied the anti-virus software developers).
The personal firewall (a firewall)
  • It protects you against Internet-borne worms and hacker attacks.
  • Intelligent automatic configuration blocks dangerous applications.
  • Shields your PC from hackers.
  • WiFi Scanner block unauthorized wireless connections.
  • IPS blocks known and unknown hacker attacks using vulnerability of the system.

Anti-phishing filter (firewall)
Recognizes fraudulent email and protects you from cyber-criminals.
Anti-Banking Trojans
It protects the user's personal data such as bank accounts and so forth. Specialized heuristics and generic detection techniques ensure maximum protection for online transactions. NEW!
Anti-Rootkit Technology
Detects and removes silently-installed rootkits used by malware or hackers to evade traditional antivirus products. The free Panda Anti-Rootkit, used by millions of people around the world, recently won the "Editor's Choice" from PC Magazine. NEW!

Download:


Post has been editedValerius the Dark - 27.08.10, 07:44



Rep: (2178)
Eset has published a list of the most common Internet threats for September
Attached ImageEset company has released a list of the most common Internet threats, identified by specialists Eset virus lab using the technology for early detection ThreatSense.Net in September 2009.

In the world ranking recorded an increase of malware spreading via removable media. To date, INF / Autorun threat are in the second position ranking (7.53%). A high percentage of infections autorun-threats noted in the United Arab Emirates (7.36%), Israel (4.99%), Latvia (4.97%) and Lithuania (5.45%).

First place still retains the worm Conficker (8.76%). Today, it is the number one threat in Russia (17,95%), Ukraine (27.03%), Romania (13.64%), Bulgaria (13.63%), Serbia (8.82%), Italy ( 7.51%), the UK (5.5%) and Austria (2.83%). Also in September, it recorded a sharp jump in the number of infected computers Conficker worm in South Africa. The number of infections has increased by 100% compared to the previous month and amounted to 18.51%. In Russia's Top Twenty is traditionally the first and second place is occupied by the version of the worm Win32 / Conficker.AA (7,68%) and Win32 / Conficker.AE (4,68%), respectively.

Another global trend marked in September, was the reduction of malware for online-games, for example, Second Life. Despite this, the percentage of infections is still quite high - 6.36%. Trojans, keyloggers family Win32 / PSW.OnLineGames occupy third place in the global ranking of viral.

In September, widespread program Win32 / Agent family used by hackers to steal information from infected computers. Percent infection was 3.46%. This software has become the number one threat in Denmark (3.32%), a large number of infected computers has also been observed in Sweden (2.75%) and Russia (3.74%).



Rep: (2178)
Fake anti-virus and spyware.

Many do not know how to install antivirus or love to try different programs.
The network appears more and more fake anti-virus programs, which essentially - harm the user's computer in some way. I propose to review them and ways of their elimination.
link



Rep: (2178)
Another massive hacking sites
Attached Image
IT company SafeScan reported the discovery of the fact of mass hacking more than 2,000 sites. Of the thousands of legitimate sites, cybercriminals have made various sources distributing malicious software.
According to Mary Landesman, senior security specialist SafeScan, unlike previous mass attacks on websites, conducted with the help of malicious code Gumblar, in the current round of attacks exploit to crack was located directly on the server, which serves a particular site. Interestingly, in each case, hacking the malicious file was located under a unique name, which in most cases was like a real-life file on the webserver. This trick significantly impeded the discovery of hacking.
"After hacking servers housed poisonous cocktail of malicious code We do not rule out the possibility that attackers continue to improve methods of attack using Gumblar, for further difficulty of detection." - says Landesman.
According to her, earlier Gumblar has already infected thousands of sites that acted as after breaking redirectors on hacking resources. Now hackers have started to place malicious code directly on the server, to hasten the process of infecting users' computers.
"Most break open the sites - these are the projects of small businesses that are not too bother to ensure adequate security of their resources," - she said.
In the current version of the attack people who are not fortunate to visit those sites, do not see anything unusual. However, in the background when you connect PHP-enabled file that checks the version of Adobe Flash or Adobe Reader on your computer. If it detects a vulnerable version of the software, the program trying to hack it with known exploits. Later hacked PC turns into a backdoor.



Rep: (2178)
Distribution key for Avira



Post has been editedValerius the Dark - 10.02.10, 19:49



Rep: (2178)
antivirus test results from Anti-Malware

Attached Image
PortalAnti-Malware.ru published the results of a new test of complex efficiency of antivirus to combat the latest malware samples (so-called threats Zero-day), transmitted users are now the most common way - through infected websites.
When testing the links to infected sites were collected from various sources. As a rule, such links each of us encounters in the search engines, receives e-mail, ICQ or through other online means of communication, including social media. To test selected links to sites infected only the latest examples of malware (which are not detected by File Anti-Virus by more than 20% from the list of tested products was verified through the service VirusTotal).
To conduct the study under VMware Workstation 6.0 management was established a set of "clean" virtual machines, which are installed the operating system Microsoft Windows XP Pro SP3 (the latest updates deliberately not placed). On each machine has its own protection program was set individually (in the test compared 18 antivirus programs from different vendors). If possible, test product for the integrated protection of Internet Security-class, but if those in the line of the vendor was not, it was used in the lower line of products. Also in the test involved two special programs for proactive protection against the latest threats grade HIPS (Hosted Intrusion Prevention System).
All antivirus tested with standard default settings and with all current updates received automatically. Simulated a situation in which a normal user with one of the established protection programs downloaded are interested in it (links to malware sites).
Attached Image
According to the results of the test proved to be the bestDefenseWall HIPS Who managed to prevent infection in 100% of cases (Platinum Award). Very good results have shown three antivirus products: Kaspersky Internet Security, Comodo Internet Security and Trend Micro Internet Security That could prevent infection by more than 80% of cases. They went "gold".
Good efficacy against new malicious programs have demonstrated Sophos Anti-Virus, Safe'n'Sec Personal, Avira Premium Security Suite, Norton Internet Security and Avast Antivirus Professional (Silver Award). Of this group, a significant progress compared to last year's pilot testing noticeable in antivirus Norton and Avast.
The bronze award went antivirus Eset Smart Security, AVG Internet Security, Microsoft Security Essential and G-DATA Internet Security, break the barrier of 40%. "It is important to note that the new free antivirus from Microsoft is very good debut, ahead of many competitors paid", - noted in the Anti-Malware.
All other anti-virus software did not pass the test. Among them: F-Secure Internet Security (aka "STRIM.AntivirusВ»), McAfee Internet Security Suite, Outpost Security Suite, Panda Internet Security, BitDefender Internet Security and Dr.Web Security Space. Results BitDefender and Dr. Web seriously decreased in comparison with last year's testing.

Post has been editedValerius the Dark - 08.11.09, 13:02



Rep: (2178)
Attached Image
The company "Doctor Web," reported the appearance of new dangerous modification of Trojan-backdoorTdss , Said the publication "Case". "According to our information, the active form of the Trojan was not detected any anti-virus. Especially for the treatment of BackDoor.Tdss.565 and all its modifications updated and is available for beta testing Dr.Web anti-virus scanner , "- the company said.
It's a pretty sophisticated Trojan usingrootkit technologyand which is significantly superior to the treatment complexity notoriousRustock.C. Malicious program to ensure its subsequent startup infects the system driver serving the physical disk on which the OS is installed.
Subsequently module rootkit hides changes in the system and implements user mode components in the processes according to the configuration file.
BackDoor.Tdss.565 still do not respond to treatment by any antivirus product and not detected by most of them.
reference times
link two



Rep: (230)
November 15, 2009.
Came the final version of the product Panda Cloud Antivirus 1.0. It is a modern antivirus solution from a leading manufacturer of protection products based on the technology of "cloud" computing, and can effectively withstand a wide range of threats without having a noticeable impact on the performance of the client system, writes news.ferra.ru.
Software staffed simple and intuitive user interface. The main application window is displayed when you run Cloud Antivirus, you can instantly get information about the current state of the system. A large red icon warns the user about the dangers and icon green reports no threat. Like most anti-virus solutions, Cloud Antivirus allow the regime to use quick scan Quick Scan or perform a scan of selected disks, folders and files. At the same time performance of the application is able to impress even the most demanding users.
If desired, the user can send information about detected threats on the server, or to activate an automatic safety control. A built-in report generation mechanisms to provide customers with a full list of detected and eliminated the threat. Convenient filtering tools will quickly find reports created in the last 24 hours, last week or last month. Another useful tool is the "shopping cart" that allows you to restore mistakenly deleted files with ease.
As mentioned earlier, due to its "cloud" nature of Panda Cloud Antivirus 1.0 is different from similar solutions are extremely modest appetites with regard to system resources. Thorough beta testing has shown that the developers managed to keep its promises. The application consumes about 9 megabytes of memory in the standby mode and only 56 megabytes in the scanning process.
Special mention deserves the exceptional stability of the anti-virus. Defense mechanisms are deactivated in the event of disconnection from the "host". The solution from Panda supports offline operation, while maintaining a small part of the online database Collective Intelligence data on the hard disk of the client PC. Locally stored fragment contains the information about the newest and most dangerous threats.
The software is available for free download from the official sitehttp://www.cloudantivirus.com/en/


Antivirus has a simple interface for children without the support of the Russian language. After installation requires free registration on the light of.sayte.



Rep: (2178)
In 2010, the net number of phishing attacks is reduced
Attached Image
Researchers from the company Trusteer predict that in 2010 the net amount of phishing attacks decreased. Reason for the decrease is simple - the cost of organizing and carrying out fraudulent campaign is growing, while the return on it less. The study's authors say that many users have learned relatively well to defend against phishing attacks, and developers have created dozens of programs, warning of fraud.
At the same time, researchers are based on a survey found that at least 45% of the users at least once passed on scam sites, and did not realize that are already on the fraudulent resource. Even worse is that over the past three months, about one in ten who were on fraudulent sites, "shared" with the fraudsters their personal data. Translated into absolute figures, one in ten - that's nearly 3 million users.
But despite this seemingly large number, the year before the same trick users had 5 million people, and in 2007 - 10 million people. At the same time, to Trusteer said that the cost of carrying out the attack as many times increases. So, now the cost of the organization of a phishing scheme from scratch is worth almost 4 times more than in 2007.
Of the total base of potential victims of online fraud on a particular direction of the real victims of criminals are no more than 0.0005% of users, but given the massive attacks, even this figure makes some attacks economically viable. So, for the last year about 0.47% of all customers for online banking systems have become victims of fraud, and the average West Bank as a result of the work is losing from 2.4 to 9.4 million dollars per year.
"As a rule, victims of fraud are those who do not attach their safety any attention - a user who does not verifies the sender's address, has no protective software on computers, and does not understand the most basic principles of online banking systems" - said in Trusteer.



Rep: (2178)
Microsoft Security Essentials

Attached Image
September 29, 2009, Microsoft announced the release of its free anti-virus product for individual use under the name of Microsoft Security Essentials (MSE). At the heart of a free antivirus based on the same technology as the commercial Microsoft solutions for large companies Forefront Client Security. It should be noted that in order to use the package MSE does not require registration, there is no phase of trial use, there are no restrictions on the term of use - just download and install the package from the official Microsoft website.
However, install antivirus software is only possible on a PC that was successfully tested validation Windows Genuine Advantage.
Microsoft Security Essentials package supports work in Windows XP with Service Pack SP2 or SP3, Windows Vista and Windows 7 (including Windows XP Mode) on 32-bit and 64-bit platforms.
Initially the MSE will be available in eight languages ​​in 19 countries - Russia is currently among these countries do not have.
Microsoft Security Essentials replaces the OneCare service package and Windows Defender. The final version offers a couple of features that give the package MSE significant advantage over competing solutions.
The first of these functions - a powerful mechanism for scanning and detection
viruses. The second - a full scan on schedule system that runs only when you are not using your PC.
In a recent comparative test of free antivirus online AV-Test.org package MSE found 97.8% proposed by viruses and finished fourth, only slightly behind the leaders.
Download:


Post has been editedValerius the Dark - 22.03.10, 14:30



Rep: (586)
I'm on the laptop offits.Kaspersky 2009. And what is different from it in 2010? Thanks. (-:



Rep: (1)
Kaspersky hate, I should NOD3 just super)



Rep: (2221)
Aro777 @ 18.12.09, 1:16*
Kaspersky hate, I should NOD3 just super)

Well, God forbid ...
dama @ 18.12.09, 1:06*
Kaspersky 2009. And what is different from it in 2010?

better readhereThan duplicate on the forum ...



Rep: (2178)
Overview of viral events of 2009
Attached Image
Ending on the eastern calendar year is considered the year of the bull. For cybercriminals "red rag" were money users - easy prey in an environment where people trustingly clicks on the link provided purportedly from friends, and download the program, "necessary" to address those or other problems. Creation of destructive malware in this case in the past. Requirements of money attackers displayed in the windows of various Internet browsers and on the desktop or above all windows in the system. As the vehicle for the spread of viruses have been used as the classical channels - email, instant messaging, and the new - social networks and blogs.
rootkits
Most puzzles for virus technology in 2009. The authors of new rootkits. These malicious programs hide its presence in the system, as well as the capabilities to hide from the eyes of the user, and the majority of antivirus mode other malicious programs they download from malicious web sites. There are cases when a rootkit components have been added to the virus database of any anti-virus, but it is, nevertheless, does not notice the presence of malware objects in the system.
The most notable malicious programs in this class was the family BackDoor.Tdss (the name is classified by Dr.Web). In March it was reported that a modification of BackDoor.Tdss prevents the file monitors included in the composition of some antivirus and anti-rootkits bypasses. While the prevalence of BackDoor.Tdss was relatively low.
In November 2009, a new modification BackDoor.Tdss spread much wider. Server statistics of "Doctor Web" in the past month were about 400 000 definitions of the malware on users' computers. Up to this point the figure rarely rose above the 1000 definitions in the month.
Interestingly, the new modifications BackDoor.Tdss were enhanced with advanced hiding technologies. For example, specially created and encrypted virtual drive mechanism for bypassing certain types of behavior analyzers. In spite of such "Doctor Web" in a short time we have solved this problem by providing the company's products to correctly treat BackDoor.Tdss.
Fake anti-viruses
In the last months of the year significantly increased proliferation activity of fake anti-viruses, which are classified by Dr.Web called Trojan.Fakealert. Such programs have looks like a real antivirus program, but they are not. The aim of the creators of fake anti-viruses - to entice the user to a bogus website where he has allegedly purchased the full version of the product.
Usually, fake anti-viruses spread as attachments to spam emails or over fraudulent sites. Thus most thus transmitted Rogue AVs loader which loads at startup with malicious server components constituting the basic functionality. The emphasis is on the visual part of this type of malware - software displays the Windows system window, which inform that the alleged anti-virus integrated into the system. The main window shows the computer's scanning and simulates the detection of viruses.
Once the user has paid the money for allegedly full version of this antivirus, his troubles did not end there - he is still "on the hook", and any other malicious objects can be loaded into the system.
Since September 2009, there has been a surge of activity Information threats - in October and November was recorded at several tens of millions of detections. Before September the total number of fake anti-viruses detected in a month on users' computers were as much as 4 orders of magnitude smaller.
Windows blockers
A lot of trouble in 2009 brought users and Windows blockers - malware that Dr.Web classification called Trojan.Winlock. These malicious programs when Windows starts output of all windows message that access to the system is locked, and to this window has disappeared, it is necessary to send a paid SMS.
The reason for blocking the program can inform that the computer has allegedly unlicensed operating system or other software (rarely used other "reasons"). There are cases Distribution designers malware database for a certain amount - to get them could be anyone.
Several years ago, malware Trojan.Winlock family were less harmful, in contrast to the modern copies are automatically deleted from your computer in a few hours after installation if the user has not done anything; not start Windows in Safe mode; system really unlock if you enter the correct line, and SMS messages cost was low.
Recent modifications Trojan.Winlock become more aggressive. SMS messages to unlock much more expensive. Some modifications may or may not contain the correct code to unlock it, and, accordingly, users paying attackers left with nothing. These programs are not automatically removed from after a certain time of the system. Trojan.Winlock learned to prevent the launch of many programs that can simplify the study blocker on the infected system or simply shut the system down if you try to run this software.
In the case of infection, the next modification Trojan.Winlock do not send money to the attacker. Instead, you should contact the technical support used antivirus or on the company's forum, "Doctor Web".
browser banners
Another modification of Trojans extortionists is the family of malicious programs, installed as an extension to a browser plugin. As a result, the installation window will appear, which can take up to half of the usable area of ​​the browser window. To remove the window you want to send a text message.
Dr.Web classification the bulk of such malware is defined as one of the modifications or Trojan.Blackmailer Trojan.BrowseBan. If Trojan.Blackmailer usually installed only in the browser Internet Explorer, then Trojan.BrowseBan can be installed in several different popular browsers - Internet Explorer, Mozilla Firefox and Opera. To do this, a malicious site from which the Trojan spreads, attackers create a script that allows detecting the browser and then providing him or her version of the Trojan.
In March 2009, it was seen a surge in activity of malicious programs of this type. Then it was fixed about 3 million. Trojan.Blackmailer determinations on users' computers. On average, during the year the number of definitions of malicious browser banner was kept at 5 000 - 10 000 per month.
Encrypting documents
Another problem faced by many users in 2009, became coders documents - malware, which are defined as a Dr.Web Antivirus various modifications Trojan.Encoder. This malicious program penetrating the system is encrypted using a certain algorithm user documents without affecting the files related to the operating system. After that, the desktop notification is displayed that the user data is encrypted, and to restore the attackers to be transferred a certain amount of money.
Razrvabotchiki antivirus faced with the facts of the use of its corporate attributes in the materials of one of the authors Trojan.Encoder. cases of spam messages on behalf of "Doctor Web" company employees were also recorded, and some modifications Trojan.Encoder used drweb additional extension for encrypted files.
Despite the relatively low prevalence of malware of this type, if it enters the system they cause substantial damage - because documents often have a high value to users. Victims of Trojan.Encoder can always consult the company "Doctor Web" in the virus laboratory - the vast majority of experts will help in the recovery of encrypted documents, with free.
worms
Worms in 2009 forced many administrators of local networks of enterprises to recall the basic information security rules. The brightest representative of these malicious programs has become worm Win32.HLLW.Shadow.based.
Firstly, the worm uses to spread removable media and network drives, recalling that under current conditions it is necessary to disable startup programs with these discs. Second, the program can use the default for the Windows SMB protocol-networks. However, it goes through a dictionary common passwords, reminding network administrators that these passwords must be difficult enough - after all of this depends on the functioning of the entire network. Finally, Win32.HLLW.Shadow.based uses several known vulnerabilities of Windows-systems. At the same time at the beginning of the active promotion Win32.HLLW.Shadow.based these vulnerabilities have already been closed by the manufacturer. This fact indicates that automatic installation of updates on your operating system will never be excessive loss of Internet traffic.
Active dissemination Win32.HLLW.Shadow.based continues today. This worm continues its kind, but very effective training of network administrators.
The variety of software environments
Some malware today is able to determine your operating system, browser, version of another popular software in order to more effectively strike system. But to ensure that this scheme has started to work, attackers need to learn how to create malicious software that can run on most popular operating systems. How are things going on that front?
If you look at the statistics of malicious programs for various platforms in 2009, we can draw the following conclusions. Interest in alternative platforms is constantly increasing. According to the statistics, for platforms such as Mac OS, Linux, Windows CE is not so obvious, but the news can often hear about the malware under these systems. But to mobile platforms such as Java (which is supported by many mobile devices) and Symbian interest is increasing every month. Even despite the fact that the proportion of malware definitions generally malicious traffic is still very small.
Projected trends in 2010
In 2010 we can expect the trend to single-step coverage malicious users the greatest possible number of operating systems and browsers. We can assume that will increase the number of malicious sites that will run scripts that are capable of detecting a programming environment and depending on it to boot the corresponding malware. The operating system market is gradually exfoliates -, new OS, new mobile devices, more and more people are interested in open source software, and virus writers will react to these trends to watch out for their own benefit.
It is expected that in subsequent years, attackers will devote more time to circumvent not only the classical signature-based and heuristic technologies, but also countering behavior blockers, examples of what we see today.
Surely the development will continue new rootkit technologies, and control will be as acute as in recent years. Probably in 2010 will be made the first attempts to create a rootkit for 64-bit Windows platforms. Many experts argue that it is only a matter of time. It is very likely increased use of polymorphic technologies that can easily hinder the work of the so-called cloud-based antivirus. If the spread of malicious programs, each unique in its copy will be a significant part of all malicious traffic, it can make use of such anti-virus technology is extremely inefficient.
Amount will be taken and the creators of malicious sites. Already, anti-phishing technologies used in any modern browser, and designed to protect users from visiting malicious sites, often can not cope with the task. Attackers quickly create too many copies of the same site, and anti-phishing systems simply do not have time to work on each of them.




Rep: (0)
: Antifeminism: AVAST! It's crap, he that wants it idelaet: the spontaneous checks, then tries to delete the system files!



Rep: (2178)
sergiys1983 @ 10.1.10, 17:58*
AVAST! It also sucks

No one is forcing you to put AVAST. Install another antivirus program, a great choice.



Rep: (2178)
New ICQ-virus
Attached Image
In online diaries Runet users on Monday, there were numerous reports of the theft of passwords from ICQ - those who clicks on the link, change your password, and they can no longer log in to your account.
On Monday, many users of ICQ, QIP and other instant messengers have received from users from their contact lists message urging to press "a direct link to download the file Piggy.zipВ», after which the user is "ejected" from ICQ, as his account in turn, continued sending messages with malicious links. A feature of this spam is that "bot" comes into correspondence with the user.
It is strongly recommended not to open the link: "The fact that the link is sent, - the archive. To start a virus, you have to first download and run. " It is also noted that from its predecessors the new viral spam is different in that passwords become thieves use elements of artificial intelligence.
If you are already "picked up" the virus, it is necessary to visit the site of the program ICQ and change the password on your account. Many manufacturers of anti-virus programs already have the virus in their byzy.



Rep: (96)
Prompt please, whether there are, the cumulative update for Norton Internet Security 2007? Where you can take them?



Rep: (2178)
NqRD,

Takenfrom hereAt the end of the page.
And another onereference
Updates can be downloaded here:update the virus database program Norton AntiVirus and Norton Internet Security (except for versions 2008 and above)
virus database update Norton AntiVirus and Norton Internet Security 2008/2009/2010.
On softodrome I realized periodically available updates.



Rep: (96)
Thanks. Like the option of a third link is suitable. (To work by car, where there is no internet Norton and unfortunately will not be on the first two options are eliminated) Now let's see how it will work. And in the future. +


Full version    

Help     rules

Now: 17/07/20 at 20:35