Listado De Falsos Antivirus / Falsos Antispywares / "Rogue Software"

Total Page:16

File Type:pdf, Size:1020Kb

Listado De Falsos Antivirus / Falsos Antispywares / Listado de Falsos Antivirus / Falsos Antispywares / "Rogue Software" http://www.forospyware.com/t5.html El siguiente listado fue generado y es mantenido por el equipo de "ForoSpyware.com" con colaboración de SpywareWarrior (lugar donde se origino el primer listado oficial y el cual se encuentra descontinuado desde Abril del 2007), por lo que desde esa fecha en más, los programas listados son enteramente de nuestra responsabilidad e investigación. Si tiene cualquiera de estos programas desinstálelo inmediatamente si no quiere correr el riesgo de infectarse con la misma basura que irónicamente muchos de ellos dicen quitar (virus/spyware) Que es un Falso Antivirus / Antispyware? Se le denomina Rogue Software (o también Rogue, Rogueware, FakeAVs, Badware, Scareware) a los “Falsos” programas de seguridad” que no son realmente lo que dicen ser, sino que todo lo contrario. Bajo la promesa de solucionar falsas infecciones, cuando el usuario instala estos programas, su sistema es infectado. Estos falsos Antivirus y Antispyware están diseñados para mostrar un resultado predeterminado (siempre de infección) y no hacen ningún tipo de escaneo real en el sistema al igual que no eliminaran ninguna infección que podamos tener. • Ver artículo completo de: Qué es el Rogue Software o FakeAV ? • Ver nuestra recopilación de imágenes de Falsos Antivirus en Flickr Falsos Antispywares / Antivirus / Rogue Software, FakeAVs: Ultimas inclusiones: 47 nuevos Rogue Antispywares. Ultima Actualización: - 01 de Septiembre del 2009 - 898 aplicaciones: 1. #1 Spyware Killer 2. 1 Click Spy Clean 3. 100 Percent Anti-Spyware 4. 1-2-3 Spyware Free 5. 1stAntiVirus 6. 2004 Adware/Spyware Remover & Blocker 7. 2-AntiSpyware A 8. about:blank 2005 9. ANG AntiVirus 09 10.ASC-AntiSpyware 11.Ad Butcher 12.AdArmor 13.AdDriller 14.AddwareRemover 15.Addwere 16.Ad-Eliminator 17.AdEradicator 18.AdFlusher 19.Ad-Protect 20.AdProtector 21.Ad-Purge Adware & Spyware Remover 22.ADS Adware Remover 23.Ads Alert 24.AdScrub 25.AdStriker 26.AdsZapper 27.Advanced Antivirus 28.Advanced Spyware Detect 29.Advanced Spyware Remover 30. Advanced Virus Remover 31. Virus Remover Professional 32.AdvancedCleaner 33.AdvancedXPDefender 34.AdvancedXPFixer 35.Adware & Spyware Firewall 36.Adware Agent 37.Adware Bazooka 38.Adware Butcher 39.Adware Cops 40.Adware Filter 41.Adware Hitman 42.Adware Punisher 43.Adware Remover 44.Adware Remover Gold 45.Adware Sheriff 46.AdWare SpyWare Blocker & Removal 47.Adware Striker 48.Adware/Spyware Remover 49.AdwareAlert 50.AdwareBlaster 51.AdwareBlocker 52.AdwareCatch 53.AdwareCatcher 54.AdwareCheck 55.AdwareChecker 56.AdwareCleaner 57.AdwareCrusher 58.AdwareDelete 59.AdwareDeluxe 60.AdwareDestroyer 61.AdwareDetect 62.AdwareEradicator 63.AdwareEraser 64.AdwareFinder 65.AdwareFlush 66.AdwareFlusher 67.AdwareGuard 68.AdwareGuardian 69.AdwareHunter 70.AdwareInspector 71.Adware-Nuker 72.AdwarePatrol 73.AdwarePolice 74.AdwarePro 75.AdwarePunisher 76.AdwareRemover 77.AdwareSafe 78.AdwareSafety 79.AdwareSanitizer 80.AdwareScanner 81.AdwareScrub 82.AdwareScrubber 83. AdwareSheriff 84.AdwareShield 85.AdwareShredder 86.AdwareSpy 87.AdwareSquash 88.AdwareSquasher 89.AdwareStopper 90.AdwareStriker 91.AdwareSweep 92.AdwareSweeper 93.AdwareTerminator 94.AdwareTools 95.AdwareWasher 96.AdwareWatch 97.AdwareWipe 98.AdwareX 99.AdwareX Eliminator 100. AdwareZapper AdWare Pro 2009 101. Ad-Where 2005 102. Agent Spyware 103. AgentSpyware 104. AGuardDog Adware/Spyware Remover 105. AGuardDog Suite 106. AlertSpy 107. AlfaCleaner 108. Anti Virus Pro 109. AntieSpiaDorado 110. AntieSpionsPack 111. AntiGusanos2008 112. AntiMalware 2009 113. AntiMalwareSuite 114. AntiMalwareGuard 115. AntiRogue Killer (AntiRogueKiller) 116. AntiSpionage 117. AntiSpionagePro 118. AntiSpy 119. AntiSpy Advanced 120. Antispy Protector 2009 121. AntiSpyBoss 122. AntiSpyCheck 123. AntiSpyGolden 124. AntiSpyGuard 125. AntiSpyKit 126. AntiSpyPro 127. AntispySpider 128. AntiSpyStorm 129. AntiSpyStorm2008 130. Antispyware 2008 XP (Antispyware2008XP) 131. Antispyware3000 132. AntiSpyware 3000 133. Anti-Spyware Blocker 134. Antispyware Expert 135. Antispyware PRO XP 136. Antispyware Pro 2009 137. AntiSpyware Protector 138. AntiSpyware Soldier 139. Antispyware Suite 140. AntiSpywareBot 141. AntiSpywareControl 142. AntiSpywareDeluxe 143. Antispywareexpert 144. AntiSpywareGuard 145. AntiSpywareMaster 146. AntiSpywareShield 147. AntiSpywareSuite 148. AntiSpywareUpdates 149. AntiSpywareXP 2009 150. AntiSpyZone 151. AntiThiefWare 152. AntiVer2008 153. AntiVermeans 154. AntiVermins 155. AntiVerminser 156. Antivir64 157. AntivirDoc 158. AntiVirGear 159. AntiVirProtect 160. Antivirus 2008 PRO 161. Antivirus 2008 XP (Antivirus2008XP) 162. Antivirus 2009 163. Antivirus 2009 Plus 164. Antivirus 2010 165. Antivirus 360 166. AntivirusBest 167. Anti-Virus and Spyware 168. Anti-Virus and Trojan 169. Antivirus '09 170. Antivirus 360 171. Antivirus Agent Pro 172. AntivirusTrigger 173. Antivirus Email 174. AntiVirus Gold 175. AntiVirus Golden 176. AntiVirus Lab 2009 177. Antivirus Master (AV Master) 178. Anti-Virus Number 1 179. Antivirus Plasma 180. Antivirus Plus 181. Antivirus Pro 2009 AntivirusPro 2009 182. AntiVirus Protector 183. Antivirus Protection 184. Antivirus System Pro 185. Antivirus Security 186. Antivirus Sentry 187. Antivirus Solution 188. Antivirus XP 2008 (AntivirusXP2008) 189. Antivirus XP Pro 190. Antivi rus XP Pro 2009 191. AntiVirusAdvance 192. AntivirusForAll 193. AntivirusGold 194. AntiVirusPCSuite 195. AntivirusTrigger 196. AntiWorm2008 197. AntiWurm2008 198. AnyCleaner 199. ArmorWall 200. Astrum Antivirus Pro 201. AV Antispyware 202. AVCare 203. AVSystemCare 204. Awola B 205. Barracuda Antivirus 206. BazookaBar 207. BestGuardPlatinum 208. BestsellerAntivirus 209. BlockDefense 210. Botsquash 211. BPS Security Console 212. BPS Spyware & Adware Remover 213. BPS Spyware Remover 214. BraveSentry 215. BreakSpyware 216. BugsDestroyer 217. BugDoctor C 218. CheckFlow CheckSpy & Anti Spyware 2005 219. CleanerMaster 220. CleanX 221. CoffeeCup Spyware Remover 222. Computer Defender 2009 223. Consumer Identity 224. ContentEraser 225. ContraVirus 226. Contraviro 227. Copperhead AntiSpyware 228. CryptDrive 229. CurePcSolutions Anti-Spyware 230. CyberDefender D 231. DataHealer 232. DefenseAntiMalware 233. Defenza 234. Deus Cleaner 235. DIARemover 236. DioCleaner 237. DiscErrorFree 238. DisqudurProtection 239. Doctor Adware 240. Doctor Adware Pro 241. Doctor Alex 242. Doctor Antivirus 2008 243. DoctorAdwarePro 244. DoctorCleaner 245. DoctorVaccine 246. DrAntispy 247. Draze Toolbar 248. DriveCleaner 249. DriveCleaner 2006 250. DrProtection E 251. eAcceleration/Veloz Stop-Sign 252. EAdwareKiller 253. EAdwareRemoval 254. EAdwareRemover 255. EAntiSpyware 256. eAntivirusPro 257. Easy Erase Spyware Remover 258. Easy SpyRemover 259. Easy Spyware Killer 260. Easy Spyware Scanner 261. EasySprinter 262. Elimiware 263. Emco Malware Bouncer 264. ErrClean 265. Error Doctor 2008 266. Error Fix (ErrorFix) 267. Error Fixer 268. Error Scan and Fix 269. ErrorDigger 270. ErrorDoctor 271. ErrorInspector 272. ErrorKiller 273. ErrorNuker 274. ErrorProtector 275. ErrorSafe 276. ESpywareBlocker 277. ESpywareDefender 278. ESpywareKiller 279. ESpywareRemoval 280. ESpywareRemover 281. ESpywareScanner 282. ETD Security Scanner 283. Evidence Eliminator 284. Evidence Eraser Pro 285. ExpertAntivirus 286. eXPress Antivirus 2009 287. Extra Antivir 288. E-Wall Antivirus 289. Extra Antivirus 290. eXPress Antivirus 291. EZVideo F 292. Fast Antivirus 09 (FastAntivirus 09) 293. FastCleaner 294. Files Secure 2.2 295. FileFix 296. Filterprogram 297. FiltroDeTrojan 298. Fix Registry Errors 299. FixerAntispy 300. Fixiter 301. Fix Tool 302. Flobo Free Anti Spyware Clean 303. Flobo Spyware Clean 304. Free Spyware Adware Scanner and Remover 305. Freeze.com AntiSpyware 306. Froggie Scan 307. FullSystemProtection G 308. GarbageClean 309. General Antivirus 310. GoldenAntiSpy 311. GoodbyeSpy 312. GuardBar 313. GuardCenter 314. Guard-X 2009 H 315. HardDiskVakt 316. HDriveSweeper 317. HitSpy 318. HitVirus 319. HomeAntivirus 2009 320. Home Antivirus 2010 I 321. IC Spyware Scanner 322. IE AntiVirus 323. IE Defender 324. IE-Security 325. IHateAdware 326. InfeStop 327. Intelinet Anti-Spyware 328. Intelligent Spyware Cleaner 329. Internet Antivirus 330. Internet Cleanup 331. InternetAntiSpy 332. InternetShield 333. iSpyKiller 334. iSafe AntiVirus J 335. JC Spyware Remover & Adware Killer K 336. KaZaaP 337. Keep Your Privacy 338. KeineGefahr 339. KillAllSpyware 340. KillAndClean 341. KillSpy 342. KnowHowProtection 343. KVMSecureis L 344. LastDefender 345. LiveAntispy 346. LiveKill 347. LiveProtect 348. LiveProtection M 349. MacroAV 350. MagicAntispy 351. Malware Bell 352. Malware Catcher 353. Malware Scanner 354. Malware Stopper 355. MalwareAlarm 356. MalwareBot 357. MalwareBurn 358. MalwareCore 359. MalwareCleaner 360. MalwareDestructor 361. Malware Defender 2009 362. Malware Destructor 363. MalwareDoc 364. Malware Doctor 365. MalwarePatrol Pro 366. MalwarePro 367. MalwareProtector 2008 368. MalwareScanner 369. MalwareStopper 370. MalwaresWipeds 371. MalwareWar 372. MalwareWipe 373. MalwareWipe Pro 374. MalwareWiped 375. MalwareWiper 376. Malwarrior 377. MalWhere 378. Max Privacy Protector 379. MaxNetShield (MNS Spyware Remover & History Eraser) 380. MenaceRescue 381. MenaceSecure 382. MicroAntivirus (Micro Antivirus 2009) 383. MS Antivirus 384. MS Antispyware 2009 385. Mr.AntiSpy 386. My Supervisor 387. My Privacy 388. MyBugFreePc 389. MyNetProtector 390. MyPCTuneUp 391. MySpyFreePC 392.
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Gedownloade Software
    KIJK SOMS UIT MET UPDATEN !!! 2 e CD zie onderaan! GEDOWNLOADE SOFTWARE Ace Utilities 5 TROJAN!!!!!!!! Advanced System Care Pro 3.4.0 Advanced System Optimizer 3.0.6 Any Video Converter 2.7.7 Pro Ashampoo Internet Accelerator 3 Ashampoo Winoptimizer 6.24 Auslogics Boost Speed 4.5.1.4 Clean My PC 4.2.3 Error Repair Pro 4.0.5 Glary Soft Utilities Pro 2.17 Lavasoft Ad-Aware 2009 Pro Limewire Pro 5.1.4 Final Microsoft Windows XP Pro with SP 3 MS Office 2007 PC Washer 2.2.1 Power Video Converter 2.2.15 Ramsaver Raxco Perfect Disk 10 Raxco Perfect Speed PC Optimizer 2.0.0.104 Registry Booster 2010 Registry First Aid Platinum 7.1.1.1 Registry Winner 5.5.9.4 Speedconnect 7.5 Tune-Up 2010 Winzip Pro Final CD 3 PC Optimizer Pro 4.5.44 PC Tools Registry Mechanic 9.0 RamSaver Pro Registry Ace 1.0 Probleem met Patch Registry Clean Expert 4.7.6 Registry Easy 4.6 GOED PROGRAMMA! RegistryFix 7.1 Registry Tidy 2009 Registry Vac 5.0.1.26 UITSTEKEND !!! Serials Grabber 1.1 Softflyers Speed Video Converter Trojan Remover 30 dagen geldig wel update mogelijk! (SCANT ELKE DAG) Ultra Optimizer 2.0.0 UITSTEKEND!!! Ultra Video Converter 44.0827 Uniblue Driver Scanner 2009 (hoort bij Powersuite) Uniblue Registry Booster 2010 versie 4.5.0.17 Uniblue Speed Up My PC! Versie 3.5 Very PDF to Word Converter versie 3jkkkjk Webroot Windows Washer 6.5.5.155 RETAILVERSION!!! Wintools Pro 10.0.1 Winutilities 9.1 YL Computing Winutilities Wise Registry Cleaner Pro 4.83 YL Computing Winutilities 9.1 XP Antispy CD 4 1 Million Serial Keys Advanced System Care Pro 3.2.0 Any Video
    [Show full text]
  • Solutions for Increased Productivity Simple “Do-It-Yourself” Tips For
    _ Solutions for Increased Productivity Simple “Do-it-Yourself” tips for speeding up your Computer So your computer is running slow. There are numerous things that can cause a slow PC. They are: • Spyware Programs running in the background without your knowledge. (Programs that spy on your surfing habits, etc, and report this info to someone else.) • Viruses, Trojans and other forms of Malware ( Mal icious Soft ware ). • Fragmented File Systems. • Lack of Hard Drive Space. • System Tray Overload After we look at these 5 “Anti-Productivity” Scenarios, we will look at ways of dealing with them, and bringing your system back up to speed. Spyware Let’s start off with Spyware. Spyware is software installed without your knowledge. How does this software get installed without you knowing about it, you ask? Remember the old saying, “The best things in life are free.” Well, as it turns out, Software isn’t one of them. You see, just because it is free for you (financially speaking), the company is still making money on it. Yes, I know.. you have the free version, and there is a full version, which you can buy. But, even the free version is making the software company money. How you ask? Spyware. This is how it works. A Big Software Company, lets call them “ Company A ”, has a product that they want to put on the market, but they don’t want the user to have to pay for it. They still however, want to make money off it though. How, you ask? This is where the Little Software Company (“ Company B ”) comes into the picture.
    [Show full text]
  • Fraudware How It Works and How to Prevent It from Attacking Your System a Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012
    Fraudware How it works and how to prevent it from attacking your system A Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012 Before we jump in to Fraudware, we should most likely begin by defining "Malware ", which is short for "Malicious software". We've all heard a lot in the past about viruses, adware, & spyware. Today, the industry basically refers to just about any software-based threat as "Malware". More specifically, Malware is a term used to define software that is intended to disrupt the operation of a computer, collect sensitive data, or gain access to private computer systems. Its definition is always expanding since new exploits continue to evolve. Malware consists of a broad spectrum of techniques used to infect systems, including viruses, worms, Trojan horses, rootkits, backdoors and drive-by downloads. Each of these operate differently, however, attacks can very often include a combination of these methods. And, although many of you in this room may already be aware of these, some of you may not, so please bear with me as we go through a basic understanding of these. A virus is a program that infects executable software. When it runs, it allows the virus to spread to other executables. In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida. "Melissa" was one of the first major computer viruses to get the public's attention.
    [Show full text]
  • Comodo Cloud Scanner User Guide
    Comodo Cloud Scanner Software Version 2.0 User Guide Guide Version 2.0.092611 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Cloud Scanner - User Guide Table of Contents 1.Comodo Cloud Scanner - Introduction.................................................................................................................................... 3 1.1.System Requirements ........................................................................................................................................................ 4 1.2.Installing Comodo Cloud Scanner....................................................................................................................................... 5 1.3.Starting Comodo Cloud Scanner......................................................................................................................................... 9 1.4.The Main Interface.............................................................................................................................................................. 9 2.Scanning Your System............................................................................................................................................................ 11 2.1.Summary of the Scanning Process................................................................................................................................... 11 2.2.Scanning Full System.......................................................................................................................................................
    [Show full text]
  • December 8.2006 Ari Schwartz Alissa Cooper Center for Democracy
    CORR CRONIN MICHELSON BAUMGARDNER & PREECE LLP PAUL R. RASKIN Attorney at Law December 8.2006 Via Facsimile to (202) 637-0968 and First Class Mail Ari Schwartz Alissa Cooper Center For Democracy & Technology 634 Eve Street N W # 1 100 Washington DC, 20006 Re: Sol'twireOnli~ie.coni Dear Mr. Scliwariz and Ms. Cooper We represent SoftwareOt~liiie.com.We write to bring to your attention misleading characterizations of certain litigation published on the Center For Democracy & Technology's website. The litigation is State of Washington v. Software0nline.com. It is discussed on the "Spyware Enforcement - State" portion of your website under the "Consumer Privacy" Section (located at: http://~v~vw.cdt.or.~privacy/sp~are/20060626spvware-e1iSorcciiici~t-state.pl~p).Your website's niiscategorization of this matter as a "spyware case" and "spyware enforcement" creates the potential for serious damage to SoftwareOnli~ie.coi~i'sbrand, goodwill. and business prospects. SoftwarcOnl~nevoluntarily settled Consumer Protection Act claims brought by the Washington Attorney General's Office on April 1 1, 2006 The complaint filed by the State of Washington against Sott\\areO~iIinecon1 and the judgment voluntarily entered by S~ft~~~~~reOiiIiiiecoiii clo not co11ta111 cla~nisunder anti-spyware statiites or laws If yoii go to the Washington Stale Attorney General's website (located at ww w.atr.wa.yov) and type the word 'spyware" in the sciirchbox, you will not find any references to Sof'twarcOnlinc corn Further. if you search through press releases on the WSAG website, you will see that the Attorney General reports the Secure Computer action filed on January 25, 2006 as the "first lawsuit under the btate-s new conipiitcr sppvarc act" (m hup ww 'ity \\ '1 ~ov/ielcases/2006!rcl Spyware Lawsuit 0 12506 html) and the Movie Land Art Schwart7 Al issa Cooper December 8.
    [Show full text]
  • This Month ————— the Library Online-What You Never New Was
    The New Orleans Personal Computer Club Newsletter MotherBoard Volume 28, Issue 4 April 7, 2010 This Month Things, Thinglets & Thingassoes ————— By Jack Lewtschuk, Columnist, Monterey Bay Users Group, PC (MBUG-PC), Califor- The nia mbug-pc newsletter, January 2010 http://www.mbug.org/ Library Blacklion (at) royal.net Online: What You Never The Bad Guys are after Your Money New was There! Well, that’s nothing new. Speaker Just as knowing the “computer language” is good to assist communica- tion when seeking help or offering help to others, so is knowing the Ricardo G. Mesa definition of words to describe cybercrime. Just to better understand the nomenclature of cyber assaults, one has to be able to understand the lingo. I researched the Internet (some (Continued on page 2) Inside this issue: This Month at the NOPCC Things, Thinglets & The Library Online-What You Never Thingassoes 1 New was There! This month at NOPCc 1 5 Advertisements Ricardo G. Mesa, IT Network Administrator for the Jef- ferson Parish Library, will discuss internet resources Calendar of Events 6 available to library card holders, including Library NOPCC Directory Technology, Library Services, Google Scholar, Library Databases, Ancestry, Learning Express, EBSCO, Gale Group and Home Help (Brainfuse) PAGE 2 MOTHERBOARD Volume 28, Issue 4 (Continued from page 1) very helpful “e-letters”) and came up with this handy list: “Adware” A piece of software that displays advertisements on a computer after the software is installed. Adware can be benign, as in the case of a free program that displays ads in a manner that is This column left blank.
    [Show full text]
  • Digital Blackmail As an Emerging Tactic 2016
    September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer
    [Show full text]
  • Contents in This Issue
    APRIL 2006 The International Publication on Computer Virus Prevention, Recognition and Removal CONTENTS IN THIS ISSUE 2 COMMENT LEAP YEAR Problems for AV vendors: some thoughts Although the hype surrounding OSX/Leap-A far outweighs the number of reported infections, the 3 NEWS virus does present a number of new ideas that we may well see again. Glyn Kennington investigates. More updating woes page 4 Spy couple sentenced ‘Real’ computer virus MR AND MRS ROOTKIT Viewers of the German version of the Mr. and Mrs. Smith movie DVD were surprised to find a little 3 VIRUS PREVALENCE TABLE more than they had bargained for on their DVDs thanks to the presence of a new protection system. VIRUS ANALYSES The protection software was found to be using 4 A small step for Mac OS X rootkit-like techniques to hide itself. Elia Florio discusses the security issues associated with the 6 Not a feeble attempt Settec DRM case. page 10 10 FEATURE LINUX COMPARATIVE Stories from the DRM world: the Settec case The main competition amongst products this month seemed to be to determine 13 COMPARATIVE REVIEW which could have the least useful Red Hat Linux 9 documentation – find out which products redeemed themselves by achieving a VB 100%. page 13 20 END NOTES & NEWS This month: anti-spam news & events and Sorin Mustaca takes an indepth look at PayPal phishing. ISSN 1749-7027 COMMENT ‘I see drowning in • Analysing proactive technologies, including heuristics and behaviour blockers so as to penetrate new malware as systems despite these barriers. one of the main • Interfering with anti-virus solutions, for instance, by issues facing the blocking automatic updates.
    [Show full text]
  • Datasheets Datasheet
    PROFESSIONAL DATASHEETSDATASHEET Get that fresh ‘new PC’ feeling back with CCleaner Professional If your PC is slow, crashing or running out of hard drive space, CCleaner Professional is the solution. Its patented cleaner clears the clutter from your hard drive, removes junk from the Windows Registry, and protects your privacy by removing tracking cookies and browser history. All without touching your documents, music, videos and other files. If you have more than one person using your PC, CCleaner Professional can clean multiple user profiles. With system monitoring it keeps an eye on your system in the background and cleans when needed. It updates itself automatically, so you’ve always got the latest version. And if you have any questions, our priority technical support team has answers. Regain your PC’s speed, stability and privacy with CCleaner Professional. CCLEANER PROFESSIONAL HIGHLIGHTS 1. CCleaner Professional analyzes PCs to see what can be cleaned. You decide when and what to clean. 2. The patented Registry cleaner locates and fixes problems in the Windows Registry so that Windows remains stable on your PC. 3. CCleaner Professional removes tracking cookies, while keeping the cookies you need to access web-based applications like Gmail and Facebook. MADE BY For more information contact [email protected] www.piriform.com PROFESSIONAL DATASHEET CCLEANER PROFESSIONAL: A FASTER, MORE RELIABLE PC – INSTANTLY Make your PC last longer CCleaner Professional speeds up your PC and recovers hard drive space. It’s like getting a brand-new PC for a fraction of the cost. Easy to use If you can use email, you can use CCleaner Professional.
    [Show full text]
  • Information Security Primer from Social Engineering to SQL Injection...And Everything Beginning with P
    Information Security Primer From Social Engineering to SQL Injection...and Everything Beginning with P PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 18 Aug 2009 21:14:59 UTC Contents Articles It Begins with S 1 Social engineering (security) 1 Spyware 7 SQL injection 26 Bonus Material 34 Password cracking 34 References Article Sources and Contributors 41 Image Sources, Licenses and Contributors 43 Article Licenses License 44 1 It Begins with S Social engineering (security) Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. Social engineering techniques and terms All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.[1] These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques, some of which are listed here: Pretexting Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.
    [Show full text]
  • (IN)SECURE Magazine Contacts
    It’s February and the perfect time for another issue of (IN)SECURE. This time around we bring you the opinions of some of the most important people in the anti-malware industry, a fresh outlook on social engineering, fraud mitigation, security visualization, insider threat and much more. We’ll be attending InfosecWorld in Orlando, Black Hat in Amsterdam and the RSA Conference in San Francisco. In case you want to show us your products or just grab a drink do get in touch. Expect coverage from these events in the April issue. I’m happy to report that since issue 14 was released we’ve had many new subscribers and that clearly means that we’re headed in the right direction. We’re always on the lookout for new material so if you’d like to present yourself to a large audience drop me an e-mail. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2008. www.insecuremag.com Qualys releases QualysGuard PCI 2.0 Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds new capabilities for large corporations to facilitate PCI compliance on a global scale.
    [Show full text]