Nw3c Board of Directors

Total Page:16

File Type:pdf, Size:1020Kb

Nw3c Board of Directors NW3C BOARD OF DIRE C TORS CHAIR M AN DIRE C TOR Glen B. Gainer, III Don Brackman WV State Auditor’s Office NW3C NORTHEAST MOUNTAIN Christopher Cotta Kathleen Kempley Secretary Treasurer Rhode Island Office of the Attorney General Arizona Attorney General’s Office GREAT LAKES SOUTH CENTRAL Larry Turner Denise Voigt Crawford T i Board Member Board Member Indiana State Police Texas State Securities Board MID-ATLANTI C SOUTHEAST Michael Brown John Whitaker Board Member Board Member Bedford County Sheriff’s Office Georgia Bureau of Investigation MIDWEST WEST Paul Cordia Sean M. Rooney Vice Chairman Board Member I Missouri State Highway Patrol California Department of Corporations 1 ? .1 The mission of the National White Collar Crime Center (NW3C) is to provide training, investigative support and research to agencies and entities involved in the prevention, investigation and prosecution of economic and high-tech crime. NW3C is a non-profit organization serving more than 3,100 member agencies in all 50 states, 4 U.S. Territories, and 14 Countries. Membership in NW3C is free. NW3C Executive Team Deputy Director: Ken Brooks Deputy Director: Mark Gage Deputy Director: Dave Cummings General Counsel: Mary-Ellen Kendall NW3C has offices in Virginia and West Virginia Highwoods One Alan B. Mollohan Building 10900 Nuckols Road 1000 Technology Drive Suite 325 Suite 2130 M Glen Allen, VA 23060 Fairmont, WV 26554 NATIONA L 'A HITE COLLAR CRI IAE CENTER NW . ... Bureau of Justice Assistance TEL: (800) 221-4424 TEL: (877) 628-7674 /wrua urrr Qu?rrrr 11 w u r su U.S. Department of Justice FAX: (804) 273-1234 FAX: (304) 366-9095 This project was supported by Grant No. 2008-CE-CX-0001awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the United States Department of Justice. The National White Collar Crime Center (NW3C) is the copyright owner of this magazine. This information may not be used or reproduced in any form without the express written permission of NW3C. This publication is also available for download in PDF format at www.nw3c.org. For questions or additional information, please contact Jeannette Toscano, Communications Manager, at [email protected]. ©2009. NW3C, Inc. d/b/a the National White Collar Crime Center. All rights reserved. Informant contents In This Issue: 8 Members’ Platform 18 Glen Gainer: Financial Watchdog 10 Instructor Spotlight John Dahlia 12 Fighting Internet Crime 20 iForensics NW3C Internet Fraud Analysts 22 Apples to Oranges: 13 Protecting Citizens from Comparing the Mac® OS X Identity Theft 26 Property List to the NW3C Internet Fraud Analysts Windows® Registry Capturing digital evidence is more than just “pulling the plug” on a computer. This article, Dennis Browning written by Al Lewis, Director of Forensic 14 Help! Is this Check Fake? Development & Services, MacForensicLab Inc., will address the growing role of incident NW3C Internet Fraud Analysts response at a digital crime scene. 32 Seven Deadly iPhone Sins: What Every Enterprise 15 CY-FI: The Future of Cyber Should Know Forensics Jonathan Zdziarski Dr. Marcus K. Rogers 34 TomTom® GPS Device ound 16 Historic Partnership S Forensics Ushers in New Era of E Ben LeMere y l x l a Cyber Forensics a m Craig Butterworth c i i 36 The Scareware Menace s n Samantha McManus n a Ethan Arenson e t r i o o n 17 NW3C Analysts F 38 Ponzi Schemes of a Macintosh Recognized for Helping Robert Holtfreter, Ph. D. Take Down Florida- Based ID Theft Ring 28 39 Member Success Stories Craig Butterworth Mac® operating systems are being encountered more by law enforcement. Read this article, by New York State Police Computer Crime Investigator Ryan Kubasiak to learn where to look for and extract evidence on the Macintosh® OS X. The Informant is produced twice a year in the Glen Allen office. The Informant has moved to an online format and is available at http://informant.nw3c.org. Editor-in-Chief: Jeannette Toscano Editorial Staff: Loreal Bond, Craig Butterworth, Cam Brandon Graphic Design: Lindsey Bousfield Special Contributor: by Dr. Marcus K. Rogers CISSP, CCCI, Cyber Forensics Program Department of Computer & Information Technology, Purdue University http://informant.nw3c.org 3 ri: 3 a1 owl In today’s world of cybersecurity, you’ll need more than a firewall to keep00 at from getting burned. www.northropgrumman.com/cybersecurity To really beat the bad guys, you need ?rfI" I-- people not just computer programs. "' And Northrop Grumman has the expertise and the tools to keep your worst fears from coming true. This is the world of cybersecurity. A world we call home and know better than any other company in the industry. So when you’re ready to talk to the experts about cybersecurity, come talk to us at Northrop Grumman. THE FACE OF CYBERSECURITY. ©2009 Northrop Grumman Corporation 4 INFORMANT: JULY 2009 - DECEMBER 2009 McCann-Erickson Los Angeles McCANN BY DATE 5700 Wilshire Blvd. Ste. 225, Los Angeles, CA 90036 Creative Director CLIENT: NORTHROP GRUMMAN DATE: 7/15/09 Art Director JOB #: NGC MIS 6NG9 0162 AD DESC: Cybersecurity Copywriter AD #: G9162D Group Director Bleed: 9” x 11-1/2” ECD: S. Levit Acct. Supervisor Trim: 8-1/2” x 11” Art Director: K. Hastings Acct. Executive Live: 7-1/2” x 10” Copywriter: L. screen: 133/mag Print Mgr: T. Burland Print Production # Colors: 4/C Phone: 248-203-8824 Traffic Fonts: ITC Officina Sans Proofreader Pubs: NW3C INFORMANT MAGAZINE - September 2009 CLIENT PUBLICATION NOTE: Guideline for general identification only. Do not use as insertion order. Material for this insertion is to be examined carefully upon receipt. If it is deficient or does not comply with your requirements, please contact: Print Production at 248-203-8824. Dl 4 " l K e 9 F NW3C Remembeq 4 Rii s" RAOuR membeR Agencies’ -- HeTD ITIROesG Killed110 dL iIli N 1-11AtHe lAFiN[[ e OQDIl+f? d?IIIVIIuty* January 1 - June 30, 2009 Lieutenant Stuart J. Alexander Officer James Manor Corpus Christi Police Department, TX Las Vegas Metropolitan Police Department, NV Officer Cesar Arreola Officer Stephen James Mayhle El Paso County Sheriff’s Department, TX Pittsburgh Bureau of Police, PA Detective Robert Eugene Beane Trooper Joshua D. Miller Beauregard Parish Sheriff’s Office, LA Pennsylvania State Police, PA 1 Captain Scott Bierwiler Sergeant Dulan Earl Murray, Jr. Hernando County Sheriff’s Office, FL Nags Head Police Department, NC Officer Joshuah Patrick Broadway Officer James (Freddie) Norman Montgomery Police Department, AL Cobb County Police Department, GA Officer Henry Canales Officer Mark Parker Houston Police Department, TX Orange County Sheriff’s Office, FL IL Investigator Chadwick Alan Carr Officer John Pawlowski Greene County Sheriff’s Office, VA Philadelphia Police Department, PA Captain Richard J. Cashin Sergeant Ervin Romans Massachusetts Executive Office of Public Safety & Security - Oakland Police Department, CA Department of State Police, MA Sergeant Daniel Sakai Officer Glen Ciano Oakland Police Department, CA Suffolk County Police Department, NY Officer Paul J. Sciullo, II Sergeant Mark Dunakin Pittsburgh Bureau of Police, PA Oakland Police Department, CA Officer Brandon Nykori Sigler Officer Omar J. Edwards Mobile Police Department, AL New York City Police Department, NY Senior Corporal Norman Smith Officer Giovanni Gonzalez Dallas Police Department, TX Miami-Dade Police Department, FL Sergeant Andrew (Andy) Tingwall Officer John Hege New Mexico Department of Public Safety - State Police, NM Oakland Police Department, CA Officer Alejandro (Alex) Valadez Officer Eric Guy Kelly Chicago Police Department, IL Pittsburgh Bureau of Police, PA Deputy Sheriff Warren (Skip) York Officer David R. Loeffler Okaloosa County Sheriff’s Office, FL Minneapolis Police Department, MN Deputy Sheriff Burton (Burt) Lopez Okaloosa County Sheriff’s Office, FL Source * www.odmp.org http://informant.nw3c.org 5 new*Nt. %' nw3c6N%3(. memberssNIFMBFR S total member agencies as of june 30, 2009: 3,146 The following agencies became members between January and June 2009 GREAT LAKES virginia Sturgeon Bay Police Department Peterborough Police Department Ocoee Police Department University of California Police Department- Bristol Sheriff’s Office Wisconsin Department of Administration - new jersey Pinellas Park Police Department Los Angeles indiana Norton Police Department Division of Gaming Eatontown Police Department U.S. Department of Veterans Affairs Police Yreka Police Department Butler Police Department Service - Tampa guam Smithfield Police Department MOUNTAIN Florham Park Police Department Greenfield Police Department west virginia Harrison Police Department Winter Garden Police Department Guam Office of the Attorney General Owen County Prosecutor’s Office Hurricane Police Department arizona Harrison Township Police Department Winter Springs Police Department idaho Peru Police Department Kanawha County Sheriff’s Office Oro Valley Police Department Mercer County Sheriff’s Office Zephyrhills Police Department Coeur d’Alene Police Department Porter Police Department Star City Police Department Prescott Valley Police Department Mount Laurel Police Department georgia oregon Vanderburgh County Prosecutor’s Office West Virginia
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Solutions for Increased Productivity Simple “Do-It-Yourself” Tips For
    _ Solutions for Increased Productivity Simple “Do-it-Yourself” tips for speeding up your Computer So your computer is running slow. There are numerous things that can cause a slow PC. They are: • Spyware Programs running in the background without your knowledge. (Programs that spy on your surfing habits, etc, and report this info to someone else.) • Viruses, Trojans and other forms of Malware ( Mal icious Soft ware ). • Fragmented File Systems. • Lack of Hard Drive Space. • System Tray Overload After we look at these 5 “Anti-Productivity” Scenarios, we will look at ways of dealing with them, and bringing your system back up to speed. Spyware Let’s start off with Spyware. Spyware is software installed without your knowledge. How does this software get installed without you knowing about it, you ask? Remember the old saying, “The best things in life are free.” Well, as it turns out, Software isn’t one of them. You see, just because it is free for you (financially speaking), the company is still making money on it. Yes, I know.. you have the free version, and there is a full version, which you can buy. But, even the free version is making the software company money. How you ask? Spyware. This is how it works. A Big Software Company, lets call them “ Company A ”, has a product that they want to put on the market, but they don’t want the user to have to pay for it. They still however, want to make money off it though. How, you ask? This is where the Little Software Company (“ Company B ”) comes into the picture.
    [Show full text]
  • Fraudware How It Works and How to Prevent It from Attacking Your System a Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012
    Fraudware How it works and how to prevent it from attacking your system A Fast Rhino Presentation to the Vistoso Computer Society November 11, 2012 Before we jump in to Fraudware, we should most likely begin by defining "Malware ", which is short for "Malicious software". We've all heard a lot in the past about viruses, adware, & spyware. Today, the industry basically refers to just about any software-based threat as "Malware". More specifically, Malware is a term used to define software that is intended to disrupt the operation of a computer, collect sensitive data, or gain access to private computer systems. Its definition is always expanding since new exploits continue to evolve. Malware consists of a broad spectrum of techniques used to infect systems, including viruses, worms, Trojan horses, rootkits, backdoors and drive-by downloads. Each of these operate differently, however, attacks can very often include a combination of these methods. And, although many of you in this room may already be aware of these, some of you may not, so please bear with me as we go through a basic understanding of these. A virus is a program that infects executable software. When it runs, it allows the virus to spread to other executables. In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida. "Melissa" was one of the first major computer viruses to get the public's attention.
    [Show full text]
  • (IN)SECURE Magazine Contacts
    It’s February and the perfect time for another issue of (IN)SECURE. This time around we bring you the opinions of some of the most important people in the anti-malware industry, a fresh outlook on social engineering, fraud mitigation, security visualization, insider threat and much more. We’ll be attending InfosecWorld in Orlando, Black Hat in Amsterdam and the RSA Conference in San Francisco. In case you want to show us your products or just grab a drink do get in touch. Expect coverage from these events in the April issue. I’m happy to report that since issue 14 was released we’ve had many new subscribers and that clearly means that we’re headed in the right direction. We’re always on the lookout for new material so if you’d like to present yourself to a large audience drop me an e-mail. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2008. www.insecuremag.com Qualys releases QualysGuard PCI 2.0 Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds new capabilities for large corporations to facilitate PCI compliance on a global scale.
    [Show full text]
  • Symantec Report on Rogue Security Software July 08 – June 09
    EXECUTIVE SUMMARY: SYMANTEC ENTERPRISE SECURITY SYMANTEC SUMMARY: EXECUTIVE Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software Executive Summary Contents Introduction . 1 Overview of Rogue Security Software. 1 Conclusion. 9 Highlights . 10 Credits . 11 Symantec Report on Rogue Security Software Executive Summary Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. A rogue security software program is a type of misleading application that pretends to be legitimate security software, such as an antivirus scanner or registry cleaner, but which actually provides a user with little or no protection and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. The perpetrators of these rogue security software scams are well-equipped to prey on Internet users. Many of these scams are very lucrative and appear to be run by highly organized groups or individuals who maintain an effective distribution network bolstered by multi-level marketing efforts. These scams employ a full range of advertising and distribution techniques to ensnare potential victims, while offering substantial profit for scam distributors, given that advertised costs for these products range from $30 to $100.1 In total, Symantec has detected over 250 distinct rogue security software programs. During the period of this report, from July 1, 2008, to June 30, 2009,2 Symantec received reports of 43 million rogue security software installation attempts from the over 250 distinct samples.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    JANUARY 2008 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT MONITORING THE NET A richer, but more dangerous web Despite the best efforts of the IT security industry it looks like the 3 NEWS malicious bot is here to Guidelines issued for UK hacker tool ban stay. Andrei Gherman looks at how botnet monitoring can provide information about bots as 3 VIRUS PREVALENCE TABLE well as helping to keep the threat under control. page 4 FEATURES HIJACKED IN A FLASH 4 Botnet monitoring As malicious web ads become increasingly 9 Rule-driven malware identification and classification common, Dennis Elser and Micha Pekrul take a close look at a Flash advertising banner belonging 12 Inside rogue Flash ads to the SWF.AdHijack family. page 12 16 CALL FOR PAPERS OUTPOST IN THE SPOTLIGHT VB2008 John Hawes discovers how firewall expert Agnitum has fared after having added malware detection to 17 PRODUCT REVIEW its Outpost Security Suite. Agnitum Outpost Security Suite Pro 2008 page 17 22 END NOTES & NEWS This month: anti-spam news and events, and Martin Overton looks at how malware authors have started to borrow techniques from phishers. ISSN 1749-7027 COMMENT “The accessing of The accessing of media-rich, collaborative sites by employees is already cause for concern in terms of both media-rich, employee productivity and security. Businesses and collaborative sites individuals are creating and uploading content to the web with little or no control over what is hosted, and this by employees is trend is set to increase. As businesses capitalize on RIAs already cause for by expanding their online services, more and more data will be stored online – and as the explosion in social concern.” networking has already shown us, the more opportunities Mark Murtagh, Websense the Internet gives us, the more points of access it gives criminals.
    [Show full text]
  • Fiscal Year 2011 Congressional Budget Justification Summary
    FEDERAL TRADE COMMISSION FIS C AL YEAR 2011 CONGRESSIONAL BUDGE T JUS T I F I C A T ION SUMMAR Y Table of Contents Overview Statement 1 Budget Request Summary ������������������������������������������������������������������������������������������������������������������������������44 Summary of Changes 45 Budgeted Resources by Objective ������������������������������������������������������������������������������������������������������������������46 Annual Performance Measures: Fiscal Years 2010 to 2011 48 Proposed Appropriations Language 53 Table of Contents Fiscal Year 2011 Budget Justification Summary Federal Trade Commission Fiscal Year 2011 Overview Statement The Federal Trade Commission (FTC) is the only federal agency with jurisdiction to enhance consumer welfare and protect competition in broad sectors of the economy. It enforces the laws that prohibit business practices that are anticompetitive, deceptive, or unfair to consumers, and seeks to do so without impeding legitimate business activ- ity. The FTC also educates consumers and businesses to encourage informed consumer choices, compliance with the law, and public understanding of the competitive process. Through enforcement, advocacy, education, and policy work, the FTC protects consumers and promotes competi- tive markets in both the United States and around the world. Highlights of FY 2009 Accomplishments In fiscal year
    [Show full text]
  • Trojans, Click Fraud, and Money Appeals Are Just a Few of the Vectors That Help Malware Writers Take Advantage of Internet Users Mcafee Security Journal Fall 2008
    Security Vision from McAfee® Avert® Labs Fall 2008 SOCIAL ENGINEERING The World’s Leading Security Threat TROJANS, click fraud, and money appeals are just a few of the vectors that help malware writers take advantage of Internet users McAfee Security Journal Fall 2008 Editor Contents Dan Sommer Contributors Anthony Bettini Hiep Dang Benjamin Edelman Elodie Grandjean 4 The Origins of Social Engineering From Odysseus’ Trojan horse to Jeff Green phishing on the Internet: Deception just won’t go away. By Hiep Dang Aditya Kapoor Rahul Kashyap Markus Jacobsson 9 Ask and You Will Receive The psychology of social engineering: Karthik Raman Why does it work? By Karthik Raman Craig Schmugar 13 Social Engineering 2.0: What’s Next Click fraud appears one of the Statistics most likely threats that we’ll face in the near future. By Markus Jakobsson Toralv Dirro Shane Keats 16 The Beijing Olympics: Prime Target for Social Engineering Malware David Marcus The five rings, and other major events, are an irresistible attraction for François Paget malware authors. By Elodie Grandjean Craig Schmugar 22 Vulnerabilities in the Equities Markets Can hackers make money Illustrator from Patch Tuesday and other company news? By Anthony Bettini Doug Ross 28 The Future of Social Networking Sites Lots of money and users make Design social sites another magnet for malware. By Craig Schmugar PAIR Design, LLC 31 The Changing Face of Vulnerabilities Social engineering tricks can Acknowledgements lead users into holes in software. By Rahul Kashyap Many people helped create this issue of the McAfee Security Journal. We would like to cite a number of the key 34 Typosquatting: Unintended Adventures in Browsing Incautious web contributors: the senior executives at browsing can lead to the unexpected.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    APRIL 2009 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT ROGUE TRADERS Flooding the cloud Rogue anti-malware applications have been around for several years, 3 NEWS conning and causing Ghostly goings on confusion among users as well as posing problems for anti-malware Internet fraud complaints rise vendors. Gabor Szappanos takes a look at a piece of anti-virus scamware. page 9 3 VIRUS PREVALENCE TABLE APPLE CATCHER Mario Ballano Barcena and Alfredo Pesoli take 4 TECHNICAL FEATURE a detailed look at what appears to be the fi rst real attempt to create a Mac botnet. Anti-unpacker tricks – part fi ve page 12 VB100 ON WINDOWS XP MALWARE ANALYSES VB’s anti-malware testing team put 9 Your PC is infected a bumper crop of products through their paces on Windows XP. Find out 12 The new iBotnet which products excelled and which have some more work to do. page 15 15 COMPARATIVE REVIEW Windows XP SP3 36 END NOTES & NEWS This month: anti-spam news and events; and John Levine looks at message authentication using Domain Keys Identifi ed Mail (DKIM). ISSN 1749-7027 COMMENT ‘An even better mutated variations of malware in large volume. While this strategy won’t work against all technologies solution is to be (for example it is ineffective against HIPS, advanced proactive in the heuristics, generic detection etc.), it is well worth the cloud.’ effort for its ability to evade signature detection. I was interested to fi nd out whether these explanations Luis Corrons could be verifi ed by our detection data – for example Panda Security to see for how long each threat was active.
    [Show full text]
  • Listado De Falsos Antivirus / Falsos Antispywares / "Rogue Software"
    Listado de Falsos Antivirus / Falsos Antispywares / "Rogue Software" http://www.forospyware.com/t5.html El siguiente listado fue generado y es mantenido por el equipo de "ForoSpyware.com" con colaboración de SpywareWarrior (lugar donde se origino el primer listado oficial y el cual se encuentra descontinuado desde Abril del 2007), por lo que desde esa fecha en más, los programas listados son enteramente de nuestra responsabilidad e investigación. Si tiene cualquiera de estos programas desinstálelo inmediatamente si no quiere correr el riesgo de infectarse con la misma basura que irónicamente muchos de ellos dicen quitar (virus/spyware) Que es un Falso Antivirus / Antispyware? Se le denomina Rogue Software (o también Rogue, Rogueware, FakeAVs, Badware, Scareware) a los “Falsos” programas de seguridad” que no son realmente lo que dicen ser, sino que todo lo contrario. Bajo la promesa de solucionar falsas infecciones, cuando el usuario instala estos programas, su sistema es infectado. Estos falsos Antivirus y Antispyware están diseñados para mostrar un resultado predeterminado (siempre de infección) y no hacen ningún tipo de escaneo real en el sistema al igual que no eliminaran ninguna infección que podamos tener. • Ver artículo completo de: Qué es el Rogue Software o FakeAV ? • Ver nuestra recopilación de imágenes de Falsos Antivirus en Flickr Falsos Antispywares / Antivirus / Rogue Software, FakeAVs: Ultimas inclusiones: 47 nuevos Rogue Antispywares. Ultima Actualización: - 01 de Septiembre del 2009 - 898 aplicaciones: 1. #1 Spyware Killer 2. 1 Click Spy Clean 3. 100 Percent Anti-Spyware 4. 1-2-3 Spyware Free 5. 1stAntiVirus 6. 2004 Adware/Spyware Remover & Blocker 7. 2-AntiSpyware A 8.
    [Show full text]
  • MARCH 2006 45 50 39 Project2 1/20/06 10:55 AM Page 2
    0306red_cover.v2 2/14/06 10:45 AM Page 1 Spyware: Readers Strike Back! 39 MARCH 2006 WWW.REDMONDMAG.COM TheThe 800800-Pound-Pound GorillaGorilla Can Microsoft Be Knocked Off Its Perch? 28 > $5.95 03 • New Column MARCH Mr. Roboto: Automation for the Harried Administrator 50 25274 867 27 71 Your Worst IT Nightmare 45 Project2 1/20/06 10:55 AM Page 2 Get your FREE trial version of GFI MailSecurity today! GFI MailSecurity for Exchange/SMTP is an email content checking, GFI MailSecurity for Exchange/SMTP Features exploit detection, threats analysis and anti-virus solution that removes Multiple virus engines all types of email-borne threats before they can affect your email users. Norman Virus Control and BitDefender virus engines included GFI MailSecuritys key features include multiple virus engines, to guarantee Kaspersky and McAfee virus engines optional higher detection rate and faster response to new viruses; email content Trojan & Executable Scanner and attachment checking, to quarantine dangerous attachments and Email content and attachment checking content; an exploit shield, to protect against present and future viruses Exploit shield based on exploits (e.g., Nimda, Bugbear); an HTML threats engine, to HTML threats engine disables HTML scripts disable HTML scripts; a Trojan & Executable Scanner, to detect malicious Best of breed Exchange and gateway message scanning technology executables; and more. Spyware detection Detection of attachment extension hiding Embedded mail scanning Approve/reject quarantined mail using the
    [Show full text]
  • APCERT Annual Report 2008
    AAPPCCEERRTT 22000088 AAnnnnuuaall RReeppoorrtt APCERT Secretariat E-mail: [email protected] URL: http://www.apcert.org 1 CONTENTS Chair’s Message 2008 3 I. About APCERT 4 1. Objectives and Scope of Activities 4 2. APCERT Members 6 3. Steering Committee (SC) 7 4. Working Groups (WG) 7 II. APCERT Activity Report 2008 8 1. APCERT Activities & International Relationships/Engagements 8 2. APCERT SC Meetings 12 3. Approval of New General / Full Members 12 4. APCERT Website 12 III. Activity Reports from APCERT Members 13 Full Members 13 1. AusCERT Activity Report 2008 13 2. BKIS Activity Report 2008 23 3. CERT-In Activity Report 2008 25 4. CNCERT/CC Activity Report 2008 38 5. HKCERT Activity Report 2008 49 6. JPCERT/CC Activity Report 2008 54 7. KrCERT/CC Activity Report 2008 59 8. MyCERT Activity Report 2008 66 9. SingCERT Activity Report 2008 71 10. ThaiCERT Activity Report 2008 73 11. TWCERT/CC Activity Report 2008 78 12. TWNCERT Activity Report 2008 88 13. VNCERT Activity Report 2008 90 General Members 94 14. BDCERT Activity Report 2008 94 15. SLCERT Activity Report 2008 100 2 Chair’s Message 2008 First of all, I would like to welcome everyone to the APCERT Conference 2009, hosted for the first time in this beautiful city, Kaohsiung. The security and threat landscape in 2008 did not improve much compared to the previous years. Distributed denial of service attack, peer-to-peer based malware, fast-flux hosting, and phishing are all part of the underground economy and not showing any signs of slowing down.
    [Show full text]