trojan posts on CNET - Page 15

trojan

If it happens, you'll be safe

iAntiVirus is a free app that will scan for Mac-specific viruses and malicious software, both on your hard-drive and during real-time Web browsing. You access iAntiVirus through a menu bar icon, and the app can scan your Mac for current infections, with either a Quick Scan, a Normal Scan (longer but still relatively quick), or a Custom Scan of specific areas. You can set iAntiVirus to protect your Mac in the background (with a relatively modest resource footprint), and you can also schedule both scans and app updates every week, every day, or every other day, to make sure that … Read more

Symantec: Posted code enables VoIP spying

Along with keyloggers that track what you type, now we have to worry about malicious software that listens in on our voice over Internet Protocol conversations.

A Symantec security blog on Thursday disclosed a new Trojan horse, Tojan.Peskyspy "that records VoIP communications, specifically targeting Skype." The posting, based on analysis from Symantec's Karthik Selvaraj, pointed out that "its existence isn't due to any problems with Skype itself" but that Skype may have been targeted "simply because it has such a large install base."

Gerry Egan, Symantec's director of security response, … Read more

BOL 1052: An actual piece of horse

I'm not sure why I mentioned an actual piece of horse, but it had to do with trojan horses and mysterious laptops showing up at Governor's offices around the US. We also help you get hooked up with Snow Leopard compatibility and warn you against a couple of scary government initiatives.

Subscribe with iTunes (audio) Subscribe with iTunes (video) Subscribe with RSS (audio) Subscribe with RSS (video) EPISODE 1052

Snow Leopard Application Incompatibilities Compiled http://www.macrumors.com/2009/08/27/snow-leopard-application-incompatibilities-compiled/ http://snowleopard.wikidot.com/ http://support.apple.com/kb/HT3258

Snow Leopard’s malware protection only … Read more

Full protection from Kaspersky

Protecting your computer from viruses is not something to take lightly, so we're glad to say Kaspersky Internet Security does a better-than-average job of keeping your PC safe. Three new features along with expected upgrades to their antivirus engine keep Kaspersky competitive.

New features in the 2010 edition include a behavioral-based detection system called the Urgent Detection Sytsem. The UDS uses tthe anonymous data Kaspersky customers who choose to participate in submitting their system scans for analysis. In fact, the UDS must be opted-out of--there's a check box and data collection statement to read when you install the … Read more

Kaspersky updates security suite for 2010

UPDATED: Benchmarks provided by CNET Labs were added on Monday, August 24.

A new season of security suites is upon us, and Kaspersky has made improvements to its Kaspersky Internet Security and Kaspersky Anti-Virus programs that include changes indicative of where security software as an industry is leaning. Three new features along with expected upgrades to its antivirus engine keep Kaspersky competitive.

The full-feature suite Kaspersky Internet Security offers a complete and competitive range of security options. The new features in the 2010 edition include a behavioral-based detection system called the Urgent Detection System. The UDS utilizes the anonymous data of 10 million Kaspersky customers who choose to participate in submitting their system scans to Kaspersky's central servers for analysis. In fact, the UDS must be opted-out of--there's a check box and data collection statement to read when you install the program.

Although this might sound insidious, it's actually a smart way to leverage a huge consumer base for security purposes as long as the data remains anonymous. Symantec's Norton 2010 will contain a behavioral check, too, and what both do is look at programs installed on your computer and judge their safety based on how many people have them installed and how they behave. Among UDS's better sub-features are the ability to customize how long it takes to pass judgment on a new program and per-user configuration of the rules governing program behavior.

Even if a program has deep penetration and it starts behaving badly, Kaspersky will block it. If it's an unknown, Kaspersky will treat it skeptically, monitoring and restricting the program until it has been proven safe. The Vulnerability Scan option, available under the Scan tab, utilizes tech from Secunia to determine which programs are potential security risks because they lack recent updates or patches. For programs that may not warn you that they have a pending security update, such as Adobe Flash, having this tool baked-in could be exceptionally useful. … Read more

Security firms discover botnet on Twitter

A Twitter account can be used as the command center for harnessing a "botnet" of virus-infected computers, security firms Arbor Networks and Symantec reported. In a blog post Friday, Symantec analyst Peter Coogan wrote that researchers found an account, @upd4t3, which was tweeting out links to download a piece malware called Downloader.Sninfs. The account has since been suspended by Twitter.

Downloader.Sninfs, also known as Infostealer.Bancos, is a Trojan that uses the guise of a Brazilian banking site to collects passwords and related personal information from infected computers.

Security on Twitter is front and center right … Read more

Clampi Trojan stealing online bank data from consumers and businesses

LAS VEGAS--Hundreds of thousands of Windows computers are believed to be infected with a Trojan called "Clampi" that has been stealing banking and other log-in credentials from compromised PCs since 2007, a security researcher said on the eve of the Black Hat security conference.

Clampi, also known as Ligats, Ilomo, or Rscan, infects computers in drive-by downloads when people visit Web sites hosting malicious code that exploits vulnerabilities in browser plug-ins Flash and ActiveX, said Joe Stewart, director of malware research for the Counter Threat Unit of SecureWorks.

When the infected computer is used to access a targeted … Read more

Chinese firms behind 'Sexy Space' Trojan

F-Secure has identified three China-based companies as the creators of the "Sexy Space" Trojan, which was identified last week to have passed through Symbian Foundation's digital-signing process.

XiaMen Jinlonghuatian Technology, ShenZhen ChenGuangWuXian Technology, and XinZhongLi TianJin cloaked the malware, also known as Yxe, and submitted it to the Symbian Foundation under its Express Signing program, security company F-Secure said Wednesday in a statement.

Developers are required to submit mobile applications to the Symbian Foundation for evaluation, before the applications are accepted and enabled for handsets running the Symbian operating system. The apps are first automatically scanned for … Read more

Buzz Out Loud 1016: Summon the royal Twitterer

The monarchy comes to Twitter, but of course the Queen doesn't sully her fingers on the keyboard, she has a royal twitterer do that. We also discuss whether the new Universal Music Group deal with TuneCore will change the landscape of music. We also absolve North Korea of the botnet.

Listen now: Download today's podcast Subscribe now: iTunes (audio) | iTunes (video) | RSS (audio) | RSS (video) EPISODE 1016

Universal/TuneCore deal opens major doors for indie artists http://arstechnica.com/media/news/2009/07/universaltunecore-deal-opens-major-doors-for-indie-artists.ars http://news.cnet.com/8301-13526_3-10283224-27.html

Korean DDoS Bots To Self-Destruct http://it.slashdot.org/story/09/07/10/0452256/Korean-DDoS-Bots-To-Self-DestructRead more