MARCH 2006 45 50 39 Project2 1/20/06 10:55 AM Page 2

Total Page:16

File Type:pdf, Size:1020Kb

MARCH 2006 45 50 39 Project2 1/20/06 10:55 AM Page 2 0306red_cover.v2 2/14/06 10:45 AM Page 1 Spyware: Readers Strike Back! 39 MARCH 2006 WWW.REDMONDMAG.COM TheThe 800800-Pound-Pound GorillaGorilla Can Microsoft Be Knocked Off Its Perch? 28 > $5.95 03 • New Column MARCH Mr. Roboto: Automation for the Harried Administrator 50 25274 867 27 71 Your Worst IT Nightmare 45 Project2 1/20/06 10:55 AM Page 2 Get your FREE trial version of GFI MailSecurity today! GFI MailSecurity for Exchange/SMTP is an email content checking, GFI MailSecurity for Exchange/SMTP Features exploit detection, threats analysis and anti-virus solution that removes Multiple virus engines all types of email-borne threats before they can affect your email users. Norman Virus Control and BitDefender virus engines included GFI MailSecuritys key features include multiple virus engines, to guarantee Kaspersky and McAfee virus engines optional higher detection rate and faster response to new viruses; email content Trojan & Executable Scanner and attachment checking, to quarantine dangerous attachments and Email content and attachment checking content; an exploit shield, to protect against present and future viruses Exploit shield based on exploits (e.g., Nimda, Bugbear); an HTML threats engine, to HTML threats engine disables HTML scripts disable HTML scripts; a Trojan & Executable Scanner, to detect malicious Best of breed Exchange and gateway message scanning technology executables; and more. Spyware detection Detection of attachment extension hiding Embedded mail scanning Approve/reject quarantined mail using the web-based moderator Seamless deployment with Exchange Server User-based, flexible rules configuration Checkmark and ICSA certified Used by customers like Caterpillar, IBM, NASA, US Navy, Fujitsu and many others GFI MailSecurity supports multiple virus engines tel: +1 (888) 243 4329 | fax: +1 (919) 379 3402 | email: [email protected] | url: www.gfi.com/rms Project2 1/20/06 10:54 AM Page 1 Whos guarding your mail server? Fifi = a single anti-virus engine! Buster = the real thing! Only $925 for 50 users! Get the leading email content security & anti-virus solution! Multiple virus engines Email content checking/filtering Exploit shield & HTML threats engine Trojan & executable analyzer Get a FREE trial version today from www.gfi.com/rms Project2 1/4/06 11:14 AM Page 1 0306red_TOC_1.v5 2/14/06 2:20 PM Page 1 MARCH 2006 WWW.REDMONDMAG.COM Winner for Best Computer/Software Magazine 2005 RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY REDMOND REPORT 9 Vista Security: Worth Paying For? Why the next version of Windows may not be as secure as you think. 10 Next Chapter Opens for Open Formats Massachusetts reaffirms its open format vision with new CIO. 12 Windows Vulnerabilities COVER STORY ILLUSTRATION BY GERAD TAYLOR ILLUSTRATION for Sale The 800-Pound Hackers sold the WMF zero-day exploit for as much as $4,000 on Gorilla Russian black market Web sites. Windows and Office each dominate the landscape, like King Kong on Skull Microsoft Banishes Beta Island. What would it take to shoot Smaller, faster Vista test cycles this monkey down and give other already improving feedback. species a fighting chance? COLUMNS Page 28 4 Barney’s Rubble: Doug Barney FEATURES Linux (and the Mac) Aren’t Even Trying 39 Reader Tips: Do Away with Spyware Many programs block spyware, but few know how 22 Beta Man: Don Jones to get rid of it. Redmond readers offer some clever Windows Goes High Performance ways to banish these nasties. 50 NEW COLUMN 45 Never Again Mr. Roboto: What’s the worst thing that’s happened to you in Don Jones your IT career? Readers share their scariest Service Pack It Up Page 39 on-the-job experiences, and you can learn from their mistakes. 52 Windows Insider: Greg Shields Down the Winding InfoPath REVIEWS 13 Kill Two Birds 20 Manage the Forest 57 Security Advisor: Joern Wettern That Isolated Feeling with One Stone and the Trees NetChk Protect combines the Administer your entire 64 Foley on Microsoft: functionality of Shavlik’s Active Directory domain from Mary Jo Foley patching and anti-spyware one location. Is Microsoft Buying into the Web tools in a single console. 2.0 Hype? 25 Your Turn: 16 Schedule Jobs BizTalk Server: Getting ALSO IN THIS ISSUE the Easy Way Better All the Time 2 Redmond Magazine Online The latest version of Users say Microsoft BizTalk SmartBatch helps Server 2004—and the 2006 6 [email protected] you centralize and streamline version—significantly ease 63 Ad and Editorial Indexes Windows job scheduling. enterprise application integration. COVER ILLUSTRATION BY GERAD TAYLOR 0306red_OnlineTOC.v6 2/14/06 10:53 AM Page 2 RedmondMARCH 2006 mag.com REDMOND COMMUNITY REDMONDMAG.COM Redmond Newsletters Want More of What You Read • Redmond Report: Delivered to your in Redmond? Visit the TechLibrary inbox three times a week—featuring news on Redmondmag.com! analysis, context and laughs. By Redmond’s The TechLibrary section of Redmondmag.com is your Editor in Chief Doug Barney. resource for more in-depth information for the topics FindIT code: Newsletters we cover here in Redmond. For example, right now in • Security Watch: Keep current on the the TechLibrary you can download a free,expanded latest Windows network security topics. copy of this month’s cover story on p. 28, “The 800- This newsletter features exclusive, Pound Gorilla” (FindIT online columns by Contributing Editor code: GORPDF), in which Russ Cooper of NTBugTraq fame. author Doug Barney offers FindIT code: GORPDF FindIT code: Newsletters even more on the chal- Discussion and Forums lenges Microsoft faces in the future. And since we Post your thoughts and opinions under know you can never have too much disaster recovery our articles, or stop by the forums for information, we’ve also just posted a PDF featuring an more in-depth discussions. expanded version of last month’s cover story, “Worst FindIT code: Forum Case Scenarios” (FindIT code: WCPDF). Your Turn All PDFs in our TechLibrary are free,although a The interactivity center of the one-time registration is required. Get these resources Redmond universe, where you get to today and find out more about what our express your views. FindIT code: WCPDF TechLibrary has to offer (FindIT code: TechLibrary). FindIT code: YourTurn OTHER 101COMMUNICATIONS SITES MCPMAG.COM • MCP Radio: Host RCPmag.com Michael Domingo inter- Coming to Winning the Linux Wars views Zenprise Marketing Can you sell against free? Get the partner MCPmag.com Manager Ahmed Datoo perspective on taking on open source. in March: and Macrovision Product FindIT code: RCPLW • Recovering from Manager Bob Corrigan Chaos: Disaster Recovery • SBS Live! Microsoft ENTmag.com Tales from the Trenches MVP and Small Business Upgraded Backup Tool Restores to • What’s all the hubbub Office Servers? Read Mike Gunderloy’s take Server expert Andy Goodman ‘Dissimilar’ Hardware around security patches on MCPmag.com. heads this one-hour SBS UBDR Gold restores files to a machine from non-Microsoft troubleshooting chat on March 21 not physically identical to the one the sources? Mike Gunderloy takes backup was performed on. a closer look at how our patching FindIT code: ENTUPT practices can be better FindITCodes • Greatest Scripting Hits: Don Jones CertCities.com Throughout Redmond magazine, looks at his most popular scripts ever you’ll discover some stories contain Forcing Group Policy Application • Your Network Troubleshooting FindIT codes. Key in those codes at Derek Melber on ensuring Group Policy pains can be eased here: Send Redmondmag.com to quickly access configurations you set up stay that way. your networking woes to expanded content for the articles FindIT code: CCGPA containing those codes. [email protected] with “IT Just enter the code in the box at Help” and get assistance from our TCPmag.com the top-right corner of any page sharp networking and server experts on Redmondmag.com. Note that all Q&A: Are You Experienced? FindIT codes are one word, and are Break into the networking field. Chris Wolf, Zubair Alexander and not case sensitive. FindIT code: SMExp Sekou Page 2 | March 2006 | Redmond | redmondmag.com | Project7 1/11/06 11:17 AM Page 1 WE FIND THEM BEFORE THEY FIND YOU. Web Security Web Filtering Endpoint Security Websense® Security LabsTM You can’t afford to sit around and wait for the next attack, and neither can we. Websense® Security Labs™ scans over 350 million websites a week, discovering spyware, viruses and other web-based threats before they get to you. Get proactive. www.websense.com/security © 2006 Websense, Inc. All rights reserved. 0306red_Rubble4.v6 2/13/06 3:14 PM Page 4 Barney’sRubble Doug Barney Linux (and the RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY MARCH 2006 ■ VOL. 12 ■ NO. 3 Mac) Aren’t Even Trying Group Publisher Henry Allain Redmond Media Group Editorial Director Doug Barney Redmond Media Group ay what you will about Larry Ellison and Scott Group Associate Publisher Matt N. Morollo Redmond Media Group McNealy, when they tried to topple the Microsoft Editor in Chief Doug Barney desktop monopoly with thin clients, they put their [email protected] S Editor Keith Ward [email protected] hearts into it. Like you, I got pretty sick of the speeches, Executive Editor, Reviews Lafe Low [email protected] grandstanding and pithy quotes, but at least they were out Editor at Large Michael Desmond [email protected] there mixing it up. News Editor Scott Bekker [email protected] Managing Editor, Wendy Gonchar It ultimately didn’t work (Citrix no response. I’ve never seen such a Web Editor [email protected] owns the thin client space and they all PR black hole. Finally, after calling his Editor, Redmondmag.com, Becky Nagel run Windows!), but they gave it their office directly, Red Hat got back to CertCities.com [email protected] Editor, MCPmag.com Michael Domingo best shot.
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Solutions for Increased Productivity Simple “Do-It-Yourself” Tips For
    _ Solutions for Increased Productivity Simple “Do-it-Yourself” tips for speeding up your Computer So your computer is running slow. There are numerous things that can cause a slow PC. They are: • Spyware Programs running in the background without your knowledge. (Programs that spy on your surfing habits, etc, and report this info to someone else.) • Viruses, Trojans and other forms of Malware ( Mal icious Soft ware ). • Fragmented File Systems. • Lack of Hard Drive Space. • System Tray Overload After we look at these 5 “Anti-Productivity” Scenarios, we will look at ways of dealing with them, and bringing your system back up to speed. Spyware Let’s start off with Spyware. Spyware is software installed without your knowledge. How does this software get installed without you knowing about it, you ask? Remember the old saying, “The best things in life are free.” Well, as it turns out, Software isn’t one of them. You see, just because it is free for you (financially speaking), the company is still making money on it. Yes, I know.. you have the free version, and there is a full version, which you can buy. But, even the free version is making the software company money. How you ask? Spyware. This is how it works. A Big Software Company, lets call them “ Company A ”, has a product that they want to put on the market, but they don’t want the user to have to pay for it. They still however, want to make money off it though. How, you ask? This is where the Little Software Company (“ Company B ”) comes into the picture.
    [Show full text]
  • Fraudware How It Works and How to Prevent It from Attacking Your System a Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012
    Fraudware How it works and how to prevent it from attacking your system A Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012 Before we jump in to Fraudware, we should most likely begin by defining "Malware ", which is short for "Malicious software". We've all heard a lot in the past about viruses, adware, & spyware. Today, the industry basically refers to just about any software-based threat as "Malware". More specifically, Malware is a term used to define software that is intended to disrupt the operation of a computer, collect sensitive data, or gain access to private computer systems. Its definition is always expanding since new exploits continue to evolve. Malware consists of a broad spectrum of techniques used to infect systems, including viruses, worms, Trojan horses, rootkits, backdoors and drive-by downloads. Each of these operate differently, however, attacks can very often include a combination of these methods. And, although many of you in this room may already be aware of these, some of you may not, so please bear with me as we go through a basic understanding of these. A virus is a program that infects executable software. When it runs, it allows the virus to spread to other executables. In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida. "Melissa" was one of the first major computer viruses to get the public's attention.
    [Show full text]
  • (IN)SECURE Magazine Contacts
    It’s February and the perfect time for another issue of (IN)SECURE. This time around we bring you the opinions of some of the most important people in the anti-malware industry, a fresh outlook on social engineering, fraud mitigation, security visualization, insider threat and much more. We’ll be attending InfosecWorld in Orlando, Black Hat in Amsterdam and the RSA Conference in San Francisco. In case you want to show us your products or just grab a drink do get in touch. Expect coverage from these events in the April issue. I’m happy to report that since issue 14 was released we’ve had many new subscribers and that clearly means that we’re headed in the right direction. We’re always on the lookout for new material so if you’d like to present yourself to a large audience drop me an e-mail. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2008. www.insecuremag.com Qualys releases QualysGuard PCI 2.0 Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds new capabilities for large corporations to facilitate PCI compliance on a global scale.
    [Show full text]
  • Symantec Report on Rogue Security Software July 08 – June 09
    EXECUTIVE SUMMARY: SYMANTEC ENTERPRISE SECURITY SYMANTEC SUMMARY: EXECUTIVE Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software Executive Summary Contents Introduction . 1 Overview of Rogue Security Software. 1 Conclusion. 9 Highlights . 10 Credits . 11 Symantec Report on Rogue Security Software Executive Summary Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. A rogue security software program is a type of misleading application that pretends to be legitimate security software, such as an antivirus scanner or registry cleaner, but which actually provides a user with little or no protection and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. The perpetrators of these rogue security software scams are well-equipped to prey on Internet users. Many of these scams are very lucrative and appear to be run by highly organized groups or individuals who maintain an effective distribution network bolstered by multi-level marketing efforts. These scams employ a full range of advertising and distribution techniques to ensnare potential victims, while offering substantial profit for scam distributors, given that advertised costs for these products range from $30 to $100.1 In total, Symantec has detected over 250 distinct rogue security software programs. During the period of this report, from July 1, 2008, to June 30, 2009,2 Symantec received reports of 43 million rogue security software installation attempts from the over 250 distinct samples.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    JANUARY 2008 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT MONITORING THE NET A richer, but more dangerous web Despite the best efforts of the IT security industry it looks like the 3 NEWS malicious bot is here to Guidelines issued for UK hacker tool ban stay. Andrei Gherman looks at how botnet monitoring can provide information about bots as 3 VIRUS PREVALENCE TABLE well as helping to keep the threat under control. page 4 FEATURES HIJACKED IN A FLASH 4 Botnet monitoring As malicious web ads become increasingly 9 Rule-driven malware identification and classification common, Dennis Elser and Micha Pekrul take a close look at a Flash advertising banner belonging 12 Inside rogue Flash ads to the SWF.AdHijack family. page 12 16 CALL FOR PAPERS OUTPOST IN THE SPOTLIGHT VB2008 John Hawes discovers how firewall expert Agnitum has fared after having added malware detection to 17 PRODUCT REVIEW its Outpost Security Suite. Agnitum Outpost Security Suite Pro 2008 page 17 22 END NOTES & NEWS This month: anti-spam news and events, and Martin Overton looks at how malware authors have started to borrow techniques from phishers. ISSN 1749-7027 COMMENT “The accessing of The accessing of media-rich, collaborative sites by employees is already cause for concern in terms of both media-rich, employee productivity and security. Businesses and collaborative sites individuals are creating and uploading content to the web with little or no control over what is hosted, and this by employees is trend is set to increase. As businesses capitalize on RIAs already cause for by expanding their online services, more and more data will be stored online – and as the explosion in social concern.” networking has already shown us, the more opportunities Mark Murtagh, Websense the Internet gives us, the more points of access it gives criminals.
    [Show full text]
  • Fiscal Year 2011 Congressional Budget Justification Summary
    FEDERAL TRADE COMMISSION FIS C AL YEAR 2011 CONGRESSIONAL BUDGE T JUS T I F I C A T ION SUMMAR Y Table of Contents Overview Statement 1 Budget Request Summary ������������������������������������������������������������������������������������������������������������������������������44 Summary of Changes 45 Budgeted Resources by Objective ������������������������������������������������������������������������������������������������������������������46 Annual Performance Measures: Fiscal Years 2010 to 2011 48 Proposed Appropriations Language 53 Table of Contents Fiscal Year 2011 Budget Justification Summary Federal Trade Commission Fiscal Year 2011 Overview Statement The Federal Trade Commission (FTC) is the only federal agency with jurisdiction to enhance consumer welfare and protect competition in broad sectors of the economy. It enforces the laws that prohibit business practices that are anticompetitive, deceptive, or unfair to consumers, and seeks to do so without impeding legitimate business activ- ity. The FTC also educates consumers and businesses to encourage informed consumer choices, compliance with the law, and public understanding of the competitive process. Through enforcement, advocacy, education, and policy work, the FTC protects consumers and promotes competi- tive markets in both the United States and around the world. Highlights of FY 2009 Accomplishments In fiscal year
    [Show full text]
  • Trojans, Click Fraud, and Money Appeals Are Just a Few of the Vectors That Help Malware Writers Take Advantage of Internet Users Mcafee Security Journal Fall 2008
    Security Vision from McAfee® Avert® Labs Fall 2008 SOCIAL ENGINEERING The World’s Leading Security Threat TROJANS, click fraud, and money appeals are just a few of the vectors that help malware writers take advantage of Internet users McAfee Security Journal Fall 2008 Editor Contents Dan Sommer Contributors Anthony Bettini Hiep Dang Benjamin Edelman Elodie Grandjean 4 The Origins of Social Engineering From Odysseus’ Trojan horse to Jeff Green phishing on the Internet: Deception just won’t go away. By Hiep Dang Aditya Kapoor Rahul Kashyap Markus Jacobsson 9 Ask and You Will Receive The psychology of social engineering: Karthik Raman Why does it work? By Karthik Raman Craig Schmugar 13 Social Engineering 2.0: What’s Next Click fraud appears one of the Statistics most likely threats that we’ll face in the near future. By Markus Jakobsson Toralv Dirro Shane Keats 16 The Beijing Olympics: Prime Target for Social Engineering Malware David Marcus The five rings, and other major events, are an irresistible attraction for François Paget malware authors. By Elodie Grandjean Craig Schmugar 22 Vulnerabilities in the Equities Markets Can hackers make money Illustrator from Patch Tuesday and other company news? By Anthony Bettini Doug Ross 28 The Future of Social Networking Sites Lots of money and users make Design social sites another magnet for malware. By Craig Schmugar PAIR Design, LLC 31 The Changing Face of Vulnerabilities Social engineering tricks can Acknowledgements lead users into holes in software. By Rahul Kashyap Many people helped create this issue of the McAfee Security Journal. We would like to cite a number of the key 34 Typosquatting: Unintended Adventures in Browsing Incautious web contributors: the senior executives at browsing can lead to the unexpected.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    APRIL 2009 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT ROGUE TRADERS Flooding the cloud Rogue anti-malware applications have been around for several years, 3 NEWS conning and causing Ghostly goings on confusion among users as well as posing problems for anti-malware Internet fraud complaints rise vendors. Gabor Szappanos takes a look at a piece of anti-virus scamware. page 9 3 VIRUS PREVALENCE TABLE APPLE CATCHER Mario Ballano Barcena and Alfredo Pesoli take 4 TECHNICAL FEATURE a detailed look at what appears to be the fi rst real attempt to create a Mac botnet. Anti-unpacker tricks – part fi ve page 12 VB100 ON WINDOWS XP MALWARE ANALYSES VB’s anti-malware testing team put 9 Your PC is infected a bumper crop of products through their paces on Windows XP. Find out 12 The new iBotnet which products excelled and which have some more work to do. page 15 15 COMPARATIVE REVIEW Windows XP SP3 36 END NOTES & NEWS This month: anti-spam news and events; and John Levine looks at message authentication using Domain Keys Identifi ed Mail (DKIM). ISSN 1749-7027 COMMENT ‘An even better mutated variations of malware in large volume. While this strategy won’t work against all technologies solution is to be (for example it is ineffective against HIPS, advanced proactive in the heuristics, generic detection etc.), it is well worth the cloud.’ effort for its ability to evade signature detection. I was interested to fi nd out whether these explanations Luis Corrons could be verifi ed by our detection data – for example Panda Security to see for how long each threat was active.
    [Show full text]
  • Listado De Falsos Antivirus / Falsos Antispywares / "Rogue Software"
    Listado de Falsos Antivirus / Falsos Antispywares / "Rogue Software" http://www.forospyware.com/t5.html El siguiente listado fue generado y es mantenido por el equipo de "ForoSpyware.com" con colaboración de SpywareWarrior (lugar donde se origino el primer listado oficial y el cual se encuentra descontinuado desde Abril del 2007), por lo que desde esa fecha en más, los programas listados son enteramente de nuestra responsabilidad e investigación. Si tiene cualquiera de estos programas desinstálelo inmediatamente si no quiere correr el riesgo de infectarse con la misma basura que irónicamente muchos de ellos dicen quitar (virus/spyware) Que es un Falso Antivirus / Antispyware? Se le denomina Rogue Software (o también Rogue, Rogueware, FakeAVs, Badware, Scareware) a los “Falsos” programas de seguridad” que no son realmente lo que dicen ser, sino que todo lo contrario. Bajo la promesa de solucionar falsas infecciones, cuando el usuario instala estos programas, su sistema es infectado. Estos falsos Antivirus y Antispyware están diseñados para mostrar un resultado predeterminado (siempre de infección) y no hacen ningún tipo de escaneo real en el sistema al igual que no eliminaran ninguna infección que podamos tener. • Ver artículo completo de: Qué es el Rogue Software o FakeAV ? • Ver nuestra recopilación de imágenes de Falsos Antivirus en Flickr Falsos Antispywares / Antivirus / Rogue Software, FakeAVs: Ultimas inclusiones: 47 nuevos Rogue Antispywares. Ultima Actualización: - 01 de Septiembre del 2009 - 898 aplicaciones: 1. #1 Spyware Killer 2. 1 Click Spy Clean 3. 100 Percent Anti-Spyware 4. 1-2-3 Spyware Free 5. 1stAntiVirus 6. 2004 Adware/Spyware Remover & Blocker 7. 2-AntiSpyware A 8.
    [Show full text]
  • APCERT Annual Report 2008
    AAPPCCEERRTT 22000088 AAnnnnuuaall RReeppoorrtt APCERT Secretariat E-mail: [email protected] URL: http://www.apcert.org 1 CONTENTS Chair’s Message 2008 3 I. About APCERT 4 1. Objectives and Scope of Activities 4 2. APCERT Members 6 3. Steering Committee (SC) 7 4. Working Groups (WG) 7 II. APCERT Activity Report 2008 8 1. APCERT Activities & International Relationships/Engagements 8 2. APCERT SC Meetings 12 3. Approval of New General / Full Members 12 4. APCERT Website 12 III. Activity Reports from APCERT Members 13 Full Members 13 1. AusCERT Activity Report 2008 13 2. BKIS Activity Report 2008 23 3. CERT-In Activity Report 2008 25 4. CNCERT/CC Activity Report 2008 38 5. HKCERT Activity Report 2008 49 6. JPCERT/CC Activity Report 2008 54 7. KrCERT/CC Activity Report 2008 59 8. MyCERT Activity Report 2008 66 9. SingCERT Activity Report 2008 71 10. ThaiCERT Activity Report 2008 73 11. TWCERT/CC Activity Report 2008 78 12. TWNCERT Activity Report 2008 88 13. VNCERT Activity Report 2008 90 General Members 94 14. BDCERT Activity Report 2008 94 15. SLCERT Activity Report 2008 100 2 Chair’s Message 2008 First of all, I would like to welcome everyone to the APCERT Conference 2009, hosted for the first time in this beautiful city, Kaohsiung. The security and threat landscape in 2008 did not improve much compared to the previous years. Distributed denial of service attack, peer-to-peer based malware, fast-flux hosting, and phishing are all part of the underground economy and not showing any signs of slowing down.
    [Show full text]
  • Microsoft Security Intelligence Report Volume 6 July Through December 2008
    Microsoft Security Intelligence Report Volume 6 July through December 2008 Microsoft Security Intelligence Report Microsoft Security Intelligence Report The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copy- rights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Copyright © 2009 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, ActiveX, BitLocker, Forefront, Hotmail, Internet Explorer, MSN, OneCare, Outlook, the Security Shield logo, SmartScreen, Windows, the Windows Logo, Windows Live, Windows Media, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corpora- tion in the United States and/or other countries.
    [Show full text]