Author Topic: SECURITY WARNINGS & Notices - Please post them here  (Read 2896280 times)

0 Members and 2 Guests are viewing this topic.

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89065
  • No support PMs thanks
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1350 on: May 31, 2011, 02:46:17 PM »
How many viruses are made by anti-virus companies?
http://www.emsisoft.com/en/kb/articles/tec110601/?utm_source=newsletter&utm_medium=newsletter&utm_content=tec110601&utm_campaign=news110525

I think that the article is nothing more than marketing hype, otherwise why is there the dirty big advert showing emsisoft getting 100% in an old MRG test from q3-q4 2010
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.3.6108 (build 24.3.8975.762) UI 1.0.801/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Dch48

  • Guest

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1352 on: June 01, 2011, 04:46:53 AM »
I think that the article is nothing more than marketing hype, otherwise why is there the dirty big advert showing emsisoft getting 100% in an old MRG test from q3-q4 2010
What would you expect they ad in their site? A third party product?
The article is just as informative as any other on avast blog for instance imho ::)
The best things in life are free.

AdrianH

  • Guest
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1353 on: June 01, 2011, 10:50:35 AM »

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89065
  • No support PMs thanks
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1355 on: June 01, 2011, 03:02:04 PM »
I think that the article is nothing more than marketing hype, otherwise why is there the dirty big advert showing emsisoft getting 100% in an old MRG test from q3-q4 2010
What would you expect they ad in their site? A third party product?
The article is just as informative as any other on avast blog for instance imho ::)

What I would expect is the article without the attempt at the soft sell by including the old test results. Which given the title of the blog, the marketing advert has nothing to do with the actual article.

So it is superfluous to the article, it didn't need the blatant marketing advert to make its point.

I have no problem with blog articles which are informative, just that this one when allied to a totally unconnected set of test results to me just makes it look like that was the whole purpose of the blog.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.3.6108 (build 24.3.8975.762) UI 1.0.801/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security



malcontent

  • Guest
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1358 on: June 02, 2011, 03:59:57 PM »
Facebook Attack Spreading both Windows AND Mac malware

http://www.f-secure.com/weblog/archives/00002172.html

There's a significant Facebook malware attack occurring at the moment.
Quote
The malware is using the Facebook "Likes" thumbs-up icon, but appears to be spreading via another method. Additional analysis suggests that the malware itself may be injecting a post into the victim's Facebook session.

Try as we might, our test account was not compromised by the attack server's webpage. We are now speculating that the Windows malware is a Koobface like worm with ZeuS like webinject capabilities. Our analysis continues.

iRonzel

  • Guest

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

iRonzel

  • Guest


Offline FreewheelinFrank

  • Avast Evangelist
  • Ultra Poster
  • ***
  • Posts: 4872
  • I'm a GNU
    • Don't Surf in the Nude!
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #1363 on: June 03, 2011, 09:03:26 PM »
How many viruses are made by anti-virus companies?
http://www.emsisoft.com/en/kb/articles/tec110601/?utm_source=newsletter&utm_medium=newsletter&utm_content=tec110601&utm_campaign=news110525

The blog fails to point out that a large number of new "viruses" are simply the same piece of malware rendered undetectable by being packaged or encrypted in some way.

There was a fuss a few years ago when an anti-virus company started creating new variants in this way and testing its own product against them.

Other AV companies complained that these fake viruses could find their way into AV testing virus collections and thus show them in a poor light for not detecting unreal viruses.

Possibly this story fed the urban myth somehow.

Somebody with a better memory might even remember which company it was...

(It wasn't avast!)
     Bambleweeny 57 sub-meson brain     Don't Surf in the Nude Blog

malcontent

  • Guest
TDSS Rootkit boasts new DHCP server
« Reply #1364 on: June 04, 2011, 05:33:31 AM »
TDSS Rootkit boasts new DHCP server

http://www.theregister.co.uk/2011/06/03/tdss_self_propagation_powers/
Quote
A new version of the TDSS rootkit, which also goes by the names Alureon and TDL4, is able to infect new machines using two separate methods,

The second method is to spread over local area networks by creating a rogue DHCP server and waiting for attached machines to request an IP address. When the malware finds a request, it responds with a valid address on the LAN and an address to a malicious DNS server under the control of the rootkit authors. The DNS server then redirects the targeted machine to malicious webpages.

“After these manipulations, whenever the user tries to visit any web page, s/he will be redirected to the malicious server and prompted to update his/her web browser,” Golovanov wrote. “The user will not be able to visit websites until sh/he agrees to install an 'update.'”

Late last year, TDSS acquired the ability to infect 64-bit versions of Microsoft Windows by bypassing the OS's kernel mode code signing policy. Researchers at security firm Prevx have said it's the most advanced rootkit ever seen in the wild. It is used as a backdoor to install and update keyloggers and other types of malware on infected machines, and once installed it's undetectable by most antimalware programs.
« Last Edit: June 04, 2011, 05:46:58 AM by malcontent »