Tuesday, 23 March 2010

AVG and Limewire Partnership

Yet again this once fine vendor has gone down further in my estimation. Who ever decided/sanctioned upon this ill fated venture obviously thinks the lure of this potential cash-cow is of more importance than actual online safety!

Background

Limewire is the leading freeware provider of P2P networking applications. By Partnering with AVG, Limewire has greatly reduced users’ exposure to malicious content.

The solution

Limewire integrated the AVG Anti-Virus SDK engine into their premium product. Through this partnership all files are scanned before Limewire will allow them to play or execute on end users’ computers. This prevents infected files from harming machines.
Source and further reading.

The perils of P2P(peer to peer) software use can be read here in my home forum.

Wednesday, 17 March 2010

Google's China clients seek clarity over plans

Firms in China that sell advertising on Google are demanding clarity about the company's plans in the region.

A letter from 27 Google-authorised sales representatives was posted on the website of Chinese state-run television.

The letter issues compensation demands for investors, employees and clients.

The warning comes after Google indicated it may close its Google.cn site following concerns that it was being hacked by government agents.

Google and China have not disclosed progress in any talks between them, and Google's clients in the region say that the uncertainty has been going on for too long.

Source and further reading.

Tuesday, 7 April 2009

Interview with a Microsoft MVP

This is a ongoing feature based upon a previous entry here but due to time restraints upon myself and the individuals who agree to be interviewed this will now only be done a handful of times per year. This month askey127 a helper from the USA kindly agreed to be interviewed by myself online.

askey127 is a well respected member within the Anti-Malware community, an Admin/Teacher with the Malware Removal University, and also a recipient of the Microsoft MVP Award for Windows Consumer Security.

The interview as follows:-

Dakeyras:

What got you interested in the fight against malware, askey127?

askey127:

I wanted to volunteer for a useful objective after retirement. I was hoping to utilize some of the basic software experience I had used in my earlier engineering work.
Fortunately a lot of my experience was in data analysis of text files, which happened to coincide with much of the analysis used for malware.

Dakeyras:

How would you describe malware?

askey127:

I would describe malware as intrusive software written entirely for the benefit of the purveyor, but outside the ethics of normal commercial advertising.
It is also frequently in violation of most countries' laws governing fraud and theft.
The manner of intrusion varies from week to week, but is certainly becoming more and more aggressive.
A possible trend is that some malware writers are coming closer and closer to a "we will control it or we will wreck it" philosophy..

Dakeyras:

Do you think, given the current trends of various rogue applications on the market, this has a major impact on the average home user?

askey127:

It depends on what is meant by the "average home user".
It may be that less than half of users have seen any major personal impact.
Rogue (fake) applications frequently have a more insidious byproduct of infecting the computer with information-stealing software. The application offered is only a front.
Even though the number of seriously infected users may be a minority, for any user that has been infected by malicious software, the effects can be disastrous.
An identity theft can take years of hard work to clean up, and it may produce ruined credit and large financial losses.

Dakeyras:

Apart from the obvious ramifications of identity theft online via various mediums such as a keylogger or a back-door trojans/rootkits,
what advice would you give for online safety as in regard to the aforementioned?

askey127:

There are some primary protections that can be taken for online safety.
- Machines should be using one Antivirus and one AntiSpyware application, each set for automatic updating.
- Windows automatic updates should be turned on.
- A separate third party firewall should be used on mobile laptops, although installing and answering all the initialization questions may admittedly be daunting.
- A separate non-administrator User Account should be created for day-to-day use by any inexperienced users.
- Installing a HOSTS file is a highly recommended protection. The mvps HOSTS and Bluetack HOSTS files are both excellent, with Bluetack being more aggressive at blocking adware sites.
- Older versions of Java and Adobe Reader should regularly be removed and replaced with the latest versions. Obsolete versions have been major avenues for infection in the past.

Dakeyras:

Do you have any thoughts on the current trend of malware creators spreading Polymorphic File Infectors?

askey127:

Malware purveyors are paying for the services of very skilled software writers, so the intrusions are becoming more difficult to detect and remove.
Software that changes itself is just one aspect of the hiding and cloaking trickery.

Dakeyras:

How do you see the possible future for Anti-Malware fighters such as yourself? With regard to the complexity of providing assistance to individuals whom have fallen afoul of malware?

askey127:

It may be that in the future, only certain types of infections will be recoverable through online assistance.
The measures we will need to safeguard computer technology in the future may make computer usage online less convenient, and could also make malware removal more difficult.
On the enforcement front, greater International cooperation will be necessary before all malware purveyors are treated as lawbreakers. The laws and attitudes on this type of theft and intrusion vary greatly from one country to another.
Every user eventually may need to be familiar with backing up data and re-imaging the computer as a routine defence procedure.

End of interview:-

Thank you very much askey127 for taking the time and agreeing to the interview. I appreciate it! :)

Firefox 3 becomes top browser in Europe

Microsoft last week lost European browser market leadership for the first time in years, when Mozilla's Firefox 3 took the top spot from Internet Explorer 7, Web analytics firm StatCounter said on Tuesday.

Source.

Interesting read overall, myself I have never been a particular fan of this Internet Browser and merely use if for certain applications. From my own point of view I have long since stopped participating in any online discussion about which is the best Internet Browser. Mainly because people can be quite rude and not happy when pointed out regardless the so called security of any one browser it all boils down to is it configured correctly? Online surfing habits taken into account and are both adequate security applications installed and updated along with all critical security updates for the Operating System?

Malwarebytes' Anti-Malware Update

Version 1.36 (April 6th, 2009)

1. (FIXED) Minor cosmetic issue during removal process.
2. (FIXED) Minor problem with false positives.
3. (FIXED) Silent update no longer displays message on program update.
4. (ADDED) New heuristics for Vundo infections

Source.

This is a Featured Anti-Malware application.