BEGIN README.TXT-- PC Media Antivirus (PCMAV)

Total Page:16

File Type:pdf, Size:1020Kb

BEGIN README.TXT-- PC Media Antivirus (PCMAV) --BEGIN README.TXT-- PC Media Antivirus (PCMAV) 9.9.1 Copyright (c) 2006-2014 Majalah PC Media Pinpoint Publications Group ************************************************************************ MEMANFAATKAN/MENGGUNAKAN PCMAV BERARTI ANDA MENGERTI DAN SETUJU DENGAN SELURUH KETENTUAN YANG ADA DI BAGIAN "KETENTUAN PENGGUNAAN (END-USER LICENSE)" YANG TERDAPAT PADA FILE README.TXT INI. PCMAV INI DIBUAT KHUSUS DAN DIPERSEMBAHKAN BAGI "PEMBACA SETIA" PC MEDIA DAN YANG KAMI CINTAI. MAKA DARI ITU, JIKA ANDA ADALAH PENGGUNA PEMULA DAN ATAU MERASA KESULITAN MEMAHAMI ISI README.TXT INI, BAIK SEBAGIAN MAUPUN SECARA KESELURUHAN, MAKA KAMI SANGAT MENYARANKAN ANDA UNTUK BERKONSULTASI TERLEBIH DULU DENGAN REKAN ANDA YANG LEBIH BERPENGALAMAN DALAM BERKOMPUTER. ATAU DEMI KENYAMANAN ANDA, MAKA KAMI SARANKAN UNTUK TIDAK MENGGUNAKAN PCMAV SAMA SEKALI. ************************************************************************ ------------------------------ ANTIVIRUS KEBANGGAAN INDONESIA ------------------------------ Tidak ada antivirus lain yang mampu mengatasi secara tuntas virus komputer, baik lokal maupun asing, yang banyak menyebar di Indonesia sebaik dan seaman PCMAV. Umumnya antivirus yang ada hanya mampu mengenali dan menghapus file yang dideteksi bervirus. PCMAV menyempurnakannya dengan tingkat akurasi pendeteksian yang lebih tinggi, sehingga lebih handal dalam mengembalikan file, dokumen dan sistem yang menjadi sasaran serangan virus hingga pulih 100%. Dengan PCMAV, Anda akan mendapatkan antivirus yang bukan hanya sekadar mendeteksi namun daya basminya yang tangguh mampu memburu 99.9% virus yang dikenal sampai ke "akar-akarnya", tanpa menimbulkan kerusakan pada file maupun sistem yang terinfeksi. Perpaduan keunikan fitur serta keakuratan dan kepedulian terhadap keselamatan sistem, file dan dokumen Anda, memberi kesempurnaan sebuah antivirus pada PCMAV. Di setiap edisi Majalah PC Media terbaru yang terbit tiap bulannya, kami senantiasa menyempurnakan PCMAV ini dengan kemampuan dan fitur baru demi menjadikan PCMAV sebagai antivirus yang sesuai kebutuhan Anda, pembaca setia Majalah PC Media. Dan menjadi kebanggaan Indonesia. ------------------------- APA YANG BARU?/CHANGE-LOG ------------------------- a. UPDATED! Ditambahkan database pengenal dan pembersih 116 virus lokal/ asing/varian baru yang dilaporkan menyebar di Indonesia. Total 7.888 virus beserta variannya. b. IMPROVED! Enemurasi data-data untuk proses scan pada memory dan registry. c. FIXED! False positive pada program yang di-packed menggunakan packer ASprotec sebagai FakeAV-WindowsVirtualProtector.B. d. IMPROVED! Perbaikan beberapa minor bug dan improvisasi kode internal untuk memastikan bahwa PCMAV tetap menjadi antivirus kebanggaan Indonesia. ---------------------------- FITUR & FAKTA UNGGULAN PCMAV --------------------------- Inilah keunggulan PCMAV yang membedakannya dengan antivirus sejenis: - ANTIVIRUS TERBAIK: Mengenali sekaligus mengatasi gangguan virus komputer, baik virus lokal maupun asing, yang banyak menyebar di Indonesia lebih banyak dari antivirus lainnya di dunia. - BERSIH TUNTAS: Dengan daya basmi PCMAV yang tangguh, virus yang membandel sekalipun dapat diburu sekaligus dibersihkan secara tuntas sampai ke "akar-akarnya" tanpa sisa. - PEMULIHAN SISTEM: Settingan registry dan file sistem penting Windows yang telah "rusak", baik oleh virus maupun akibat penggunaan antivirus lain yang kurang handal, mampu diperbaiki (repair) secara menyeluruh hingga pulih 100%. - PENYELAMATAN DOKUMEN: Folder maupun file dokumen penting Anda yang disembunyikan (hidden) maupun terinfeksi oleh virus dapat dipulihkan secara sempurna hingga 100% tanpa khawatir risiko kehilangan atau kerusakan pada file. - PENDETEKSIAN TERCEPAT: Dengan algoritma spesial yang terdapat dalam kode komponen inti pendeteksiannya dan dukungan teknologi multi- thread nan kompleks, meski memiliki database virus terbesar, PCMAV mampu menghasilkan performa yang begitu cepat dibanding antivirus lain yang pernah diproduksi di Indonesia. - RINGAN & HEMAT MEMORY: Dengan pengenalan database virus terbesar di Indonesia, PCMAV merupakan satu-satunya antivirus yang paling sedikit dalam pemakaian memory (rata-rata hanya 2 MB-an), sehingga mampu menghemat secara signifikan penggunaan sumber daya komputer dan tidak memberatkan sistem. - SANGAT AKURAT: Dengan formula khusus yang unik mampu menjadikan PCMAV sebagai salah satu antivirus terbaik di dunia dalam hal tingkat akurasi pendeteksian virus yang dikenal, sehingga kesalahan dalam penyelamatan file/dokumen dapat dihindari. - UPDATE OTOMATIS: Puluhan hingga ratusan virus baru ditemukan di Indonesia setiap bulannya. Secara otomatis, dengan online update secara reguler, PCMAV akan melindungi komputer Anda dari ancaman virus terbaru. - MENGENALI VIRUS BARU: Teknologi "GeneticHeuristic" yang unik secara efektif mampu mendeteksi virus baru yang belum dikenal, bahkan untuk virus script baru sekalipun, yang sering lolos oleh antivirus lain. - PEMERIKSAAN MENYELURUH: Teknologi multi-point scanning di PCMAV efektif dalam menghindari lolosnya virus yang mampu otomatis aktif baik sebagai kode injeksi, rootkit, process, services, sampai yang terjadwal sekalipun. - DUAL-CORE ANTIVIRUS ENGINE: Engine PCMAV dapat dikombinasikan dengan engine ClamAV terbaru untuk mendapatkan hasil pendeteksian dan perlindungan virus yang lebih banyak, bahkan hingga 1.000.000 virus/malware lebih. - MUDAH DIOPERASIKAN: Menu dan tampilan dari sebuah program antivirus kini begitu menyenangkan, mudah dioperasikan dan tidak ribet. - TANPA INSTALL: PCMAV bersifat portable, sehingga dapat dioperasikan secara langsung tanpa perlu meng-install-nya. - KEBANGGAAN INDONESIA: Antivirus produksi nasional pertama di Indonesia yang berkualitas dalam mengatasi secara tuntas berbagai jenis gangguan virus komputer yang membandel, dengan pengenalan virus terbanyak dan tingkat akurasi pendeteksian yang sangat tinggi. - AHLI TERPERCAYA: Dengan pengalaman sejak tahun 1992, pengembang antivirus di PC Media merupakan peneliti ahli di bidang virus komputer dan reverse code engineering, serta pembuat antivirus yang sungguh berpengalaman di Indonesia. Oleh karenanya, kami tahu benar bagaimana menghasilkan antivirus terpercaya dan terbaik sesuai kondisi pengguna komputer di Indonesia. - DUKUNGAN PC MEDIA: PCMAV didukung penuh oleh PC Media Group, kelompok penerbitan media komputer terbesar di Indonesia, yang menerbitkan majalah komputer bulanan PC Media dan majalah bulanan InfoLINUX. - GRATIS: Merupakan bonus ekstra bagi pelanggan setia majalah PC Media edisi terbaru yang terbit tiap bulan. --------------------------------------- KETENTUAN PENGGUNAAN (END-USER LICENSE) --------------------------------------- PC Media Antivirus (PCMAV) merupakan karya dan hak cipta serta bagian yang tak terpisahkan dari PC Media, majalah komputer bulanan yang diterbitkan oleh PT Dian Digital Media, sebuah kelompok penerbitan dari Pinpoint Publications. PCMAV tidak dinyatakan sebagai program yang bersifat public-domain (milik publik) maupun freeware (tanpa biaya), tetapi Anda bebas menggunakan dan menyebarluaskan program ini secara UTUH dan LENGKAP (termasuk file README.TXT ini) tanpa dikenakan biaya apapun sepanjang PCMAV tidak disertakan bersama materi yang melanggar hukum dan ketentuan program seperti yang akan dijelaskan pada bagian ini ditaati. PCMAV dan seluruh program antivirus buatan Majalah PC Media diizinkan untuk pemakaian tunggal oleh pemilik sah Majalah PC Media pada edisi yang menyertakannya, baik itu pemilik perorangan maupun sebuah badan hukum yang berada hanya di satu lokasi bangunan. Selain itu, program ini juga diizinkan untuk pemakaian di komputer pribadi/rumah, lembaga nirlaba/lembaga pendidikan yang dibiayai sepenuhnya oleh negara/ lembaga nirlaba. DILARANG KERAS MENGGUNAKAN DAN ATAU MEMANFAATKAN PCMAV VERSI INI OLEH SEBUAH INSTITUSI BISNIS ATAU BADAN/PERORANGAN YANG BERORIENTASI PROFIT DI DALAM SATU LOKASI BANGUNAN TANPA MEMILIKI SECARA SAH EDISI MAJALAH PC MEDIA YANG MEMUAT RILIS PCMAV YANG DIMAKSUD. DALAM HAL INI PENGGUNAAN TERBATAS PADA 10 (SEPULUH) KOMPUTER UNTUK TIAP 1 (SATU) MAJALAH PC MEDIA EDISI REGULER, DAN TERBATAS PADA 2 (DUA) KOMPUTER UNTUK TIAP 1 (SATU) MAJALAH PC MEDIA EDISI EKONOMIS. DILARANG KERAS MENYEDIAKAN LINK DOWNLOAD/FILE SHARING PCMAV VERSI INI DI INTERNET. PENGGUNAAN DAN ATAU PEMANFAATAN PCMAV INI TANPA IZIN UNTUK TUJUAN ATAUPUN KEPENTINGAN KOMERSIAL SAMA SEKALI TIDAK DIPERKENANKAN. Anda juga tidak diperkenankan melakukan segala tindakan, baik secara langsung maupun tidak langsung, yang dapat melanggar hak atas kekayaan intelektual, termasuk tapi tak terbatas pada apa yang dimaksud sebagai reverse engineer, decompile, disassemble, atau memodifikasi PCMAV. Pihak Majalah PC Media telah mengeluarkan segala daya dan upaya serta mengujicobanya secara sungguh-sungguh agar PCMAV dapat memberikan hasil terbaik. Namun demikian, seperti lazimnya program komputer yang lain, Anda sangat menyadari dan memahami bahwa pihak PC Media memberikan PCMAV dan segala file yang terkait secara apa adanya, tanpa memberikan jaminan apapun bahwa program ini terbebas dari segala macam risiko teknis, dan kami tidak berkewajiban mengganti segala biaya yang mungkin dapat ditimbulkan oleh segala macam fungsi dari penggunaan program ini. Untuk itu, sangat disarankan mem-backup data penting Anda sebelum menggunakan program ini. Selama berasal dari CD/DVD resmi PC Media maka PCMAV dijamin bebas virus 100%. Walau begitu, akibat ketidakakuratan engine heuristic, beberapa antivirus lain mencurigai PCMAV sebagai virus (false alarm). Silahkan
Recommended publications
  • Internet Security THREAT REPORT GOVERNMENT 2013 P
    2012 Trends, Volume 18, Published April 2013 INTERNET SECURITY THREAT REPORT GOVERNMENT 2013 p. 2 Symantec Corporation Internet Security Threat Report 2013 :: Volume 18 CONTENTS 03 Introduction 31 Social Networking, Mobile, and the Cloud 04 Executive Summary 32 Introduction 32 Data 06 2012 Security Timeline 35 Analysis 09 2012 in Numbers 35 Spam and Phishing Move to Social Media 37 Mobile Threats 13 Targeted Attacks, Hacktivism, and Data Breaches 38 Cloud Computing Risks 14 Introduction 14 Data 40 Malware, Spam, and Phishing 17 DDoS Used as a Diversion 41 Introduction 17 Data Breaches 42 Data 19 Analysis 42 Spam 19 Cyberwarfare, Cybersabotage, and Industrial Espionage 45 Phishing 20 Advanced Persistent Threats and Targeted Attacks 46 Malware 20 Social Engineering and Indirect Attacks 48 Website Exploits by Type of Website 21 Watering Hole Attacks 49 Analysis 49 Macs Under Attack 23 Vulnerabilities, Exploits, and Toolkits 50 Rise of Ransomware 24 Introduction 51 Long-term Stealthy Malware 24 Data 51 Email Spam Volume Down 26 Analysis 51 Advanced Phishing 26 Web-based Attacks on the Rise 27 The Arms Race to Exploit New Vulnerabilities 53 Looking ahead 27 Malvertising and Website Hacking 56 Endnotes 28 Web Attack Toolkits 57 Appendix 29 Website Malware Scanning and Website Vulnerability Assessment 29 The Growth of Secured Connections 29 Norton Secured Seal and Trust Marks 29 Stolen Key-signing Certificates p. 3 Symantec Corporation Internet Security Threat Report 2013 :: Volume 18 Introduction Symantec has established some of the most In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of comprehensive sources of Internet threat more than 51,644 recorded vulnerabilities (spanning more than data in the world through the Symantec™ two decades) from over 16,687 vendors representing over 43,391 Global Intelligence Network, which is made products.
    [Show full text]
  • Classification of Malware Persistence Mechanisms Using Low-Artifact Disk
    CLASSIFICATION OF MALWARE PERSISTENCE MECHANISMS USING LOW-ARTIFACT DISK INSTRUMENTATION A Dissertation Presented by Jennifer Mankin to The Department of Electrical and Computer Engineering in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering in the field of Computer Engineering Northeastern University Boston, Massachusetts September 2013 Abstract The proliferation of malware in recent years has motivated the need for tools to an- alyze, classify, and understand intrusions. Current research in analyzing malware focuses either on labeling malware by its maliciousness (e.g., malicious or benign) or classifying it by the variant it belongs to. We argue that, in addition to provid- ing coarse family labels, it is useful to label malware by the capabilities they em- ploy. Capabilities can include keystroke logging, downloading a file from the internet, modifying the Master Boot Record, and trojanizing a system binary. Unfortunately, labeling malware by capability requires a descriptive, high-integrity trace of malware behavior, which is challenging given the complex stealth techniques that malware employ in order to evade analysis and detection. In this thesis, we present Dione, a flexible rule-based disk I/O monitoring and analysis infrastructure. Dione interposes between a system-under-analysis and its hard disk, intercepting disk accesses and re- constructing high-level file system and registry changes as they occur. We evaluate the accuracy and performance of Dione, and show that it can achieve 100% accuracy in reconstructing file system operations, with a performance penalty less than 2% in many cases. ii Given the trustworthy behavioral traces obtained by Dione, we convert file system- level events to high-level capabilities.
    [Show full text]
  • Digital Transformation: Cure-All, Placebo Or Poison Pill? Leonidas Tougiannidis Country Manager, Greece & Cyprus
    Digital Transformation: Cure-all, Placebo or Poison Pill? Leonidas Tougiannidis Country Manager, Greece & Cyprus © Copyright Fortinet Inc. All rights reserved. IT Trends increase the ATTACK SURFACE & LIABILITIES ▪ Digital Transformation entails sharing data ▪ IoT brings 20 Billion new Devices Online ▪ Cloud breaks the Borders ▪ Mobility Disperses Users and Data ▪ SD-WAN stretchers enterprise networks ▪ Regulations (ie GDPR, PCI-DSS, PSD2) 2 [Digital Transformation] is the integration of digital technology into all areas of a business, resulting in fundamental changes to how businesses operate and how they deliver value to customers 3 Digital Transformation Digital Transformation Engage Your Empower Your Optimize Your Transform Your Customers Employees Business Products Digital Technology 4 Real Life Digital Transformation From 140-year old manufacturing company: Digital Transformation Goals – 2020: Top 10 Global Energy, Transportation, Healthcare Software Company – $15B Digital Revenue 5 Obstacles to Digital Transformation Security is the largest factor standing in the way of enterprise digital transformation efforts. More than half (55%) of companies said that security was the No. 1 challenge they face when implementing digital enablement technologies Source: SoftServe 2017 Cybersecurity one of Top 10 “Security nearly always tops the list of obstacles to Digital Transformation digital transformation obstacles”. Source:Harvard Business Review 2017 Marc Cecere, Forrester, ZD Net, 2017 The biggest disruptive technologies Some 57% of businesses reported cited by global respondents are the major issues finding and recruiting cloud (58%), mobility and talented IT security staff—a problem collaboration (54%), big data as digital transformation efforts (52%)...IoT (43%) move more data and systems to the cloud, and cyber attacks grow more Source: BT CIO Report 2016 sophisticated.
    [Show full text]
  • Effective Malicious Features Extraction and Classification for Incident Handling Systems
    EFFECTIVE MALICIOUS FEATURES EXTRACTION AND CLASSIFICATION FOR INCIDENT HANDLING SYSTEMS CHO CHO SAN UNIVERSITY OF COMPUTER STUDIES, YANGON OCTOBER, 2019 Effective Malicious Features Extraction and Classification for Incident Handling Systems Cho Cho San University of Computer Studies, Yangon A thesis submitted to the University of Computer Studies, Yangon in partial fulfillment of the requirements for the degree of Doctor of Philosophy October, 2019 Statement of Originality I hereby certify that the work embodied in this thesis is the result of original research and has not been submitted for a higher degree to any other University or Institution. …..…………………………… .…………........………………………… Date Cho Cho San ACKNOWLEDGEMENTS First of all, I would like to thank Hist Excellency, the Minister for the Ministry of Education, for providing full facilities support during the Ph.D. course at the University of Computer Studies, Yangon. Secondly, my profound gratitude goes to Dr. Mie Mie Thet Thwin, Rector of the University of Computer Studies, Yangon, for allowing me to develop this research and giving me general guidance during the period of my study. I would like to express my greatest pleasure and the deepest appreciation to my supervisor, Dr. Mie Mie Su Thwin, Professor, the University of Computer Studies, Yangon, for her excellent guidance, caring, patient supervision, and providing me with excellent ideas throughout the study of this thesis. I would also like to extend my special appreciation to Dr. Khine Moe Nwe, Professor and Course-coordinator of the Ph.D. 9th Batch, the University of Computer Studies, Yangon, for her useful comments, advice, and insight which are invaluable through the process of researching and writing this dissertation.
    [Show full text]
  • Malware Behavior Comportamento De Programas Maliciosos
    Andr´eRicardo Abed Gr´egio Malware Behavior Comportamento de Programas Maliciosos Campinas 2012 i ii Universidade Estadual de Campinas Faculdade de Engenharia El´etrica e de Computa¸c~ao Andr´eRicardo Abed Gr´egio Malware Behavior Comportamento de Programas Maliciosos Doctorate thesis presented to the School of Electrical and Computer Engineering in partial fulfillment of the requirements for the degree of Doctor in Electrical Engineering. Concentration area: Computer Engineering. Tese de doutorado apresentada `aFaculdade de Engenharia El´etrica e de Computa¸c~ao como parte dos requisitos exigidos para a obten¸c~aodo t´ıtulo de Doutor em Engenharia El´etrica. Area´ de concentra¸c~ao: Engenharia de Computa¸c~ao. Orientador (Tutor): Prof. Dr. Mario Jino Co-orientador (Co-Tutor): Prof. Dr. Paulo Licio de Geus Este exemplar corresponde `avers~aofinal da tese defendida pelo aluno, e orientada pelo Prof. Dr. Mario Jino. Campinas 2012 iii FICHA CATALOGRÁFICA ELABORADA PELA BIBLIOTECA DA ÁREA DE ENGENHARIA E ARQUITETURA - BAE - UNICAMP Grégio, André Ricardo Abed G861c Comportamento de programas maliciosos / André Ricardo Abed Grégio. --Campinas, SP: [s.n.], 2012. Orientador: Mario Jino. Coorientador: Paulo Licio de Geus. Tese de Doutorado - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação. 1. Redes de computadores - Medidas de segurança. 2. Tecnologia da informação - Segurança. 3. Software - Segurança. 4. Virus de computador. 5. Taxonomia. I. Jino, Mario, 1943-. II. Geus, Paulo Licio de, 1956-. III. Universidade
    [Show full text]
  • Coordinating Across Chaos: the Practice of Transnational Internet Security Collaboration
    COORDINATING ACROSS CHAOS: THE PRACTICE OF TRANSNATIONAL INTERNET SECURITY COLLABORATION A Dissertation Presented to The Academic Faculty by Tarun Chaudhary In Partial Fulfillment of the Requirements for the Degree International Affairs, Science, and Technology in the Sam Nunn School of International Affairs Georgia Institute of Technology May 2019 COPYRIGHT © 2019 BY TARUN CHAUDHARY COORDINATING ACROSS CHAOS: THE PRACTICE OF TRANSNATIONAL INTERNET SECURITY COLLABORATION Approved by: Dr. Adam N. Stulberg Dr. Peter K. Brecke School of International Affairs School of International Affairs Georgia Institute of Technology Georgia Institute of Technology Dr. Michael D. Salomone Dr. Milton L. Mueller School of International Affairs School of Public Policy Georgia Institute of Technology Georgia Institute of Technology Dr. Jennifer Jordan School of International Affairs Georgia Institute of Technology Date Approved: March 11, 2019 ACKNOWLEDGEMENTS I was once told that writing a dissertation is lonely experience. This is only partially true. The experience of researching and writing this work has been supported and encouraged by a small army of individuals I am forever grateful toward. My wife Jamie, who has been a truly patient soul and encouraging beyond measure while also being my intellectual sounding board always helping guide me to deeper insight. I have benefited from an abundance of truly wonderful teachers over the course of my academic life. Dr. Michael Salomone who steered me toward the world of international security studies since I was an undergraduate, I am thankful for his wisdom and the tremendous amount of support he has given me over the past two decades. The rest of my committee has been equally as encouraging and provided me with countless insights as this work has been gestating and evolving.
    [Show full text]
  • G Data Malwarereport Half-Yearly Report July
    G Data MalwareReport Half-yearly report July - December 2010 Ralf Benzmüller & Sabrina Berkenkopf G Data SecurityLabs 2010 - MalwareReport_2 Go safe. Go safer. G Data. G Data MalwareReport 2/2010 Contents At a Glance ............................................................................................................................................ 2 Malware: Facts and Figures ................................................................................................................. 3 The end of the growth? ........................................................................................................................................... 3 Malware categories ................................................................................................................................................... 4 Malware families ........................................................................................................................................................ 4 Platforms: Windows and Web ............................................................................................................................... 6 Trends for 2011 ........................................................................................................................................................... 7 Top subjects for the second half of 2010 ............................................................................................ 7 WikiLeaks brings 'Hacktivists' into the arena ..................................................................................................
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    APRIL 2010 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT A FUTILE BATTLE? Are takedowns an exercise in futility? Mary Landesman evaluates recent botnet takedown efforts. 3 NEWS page 2 VB2010 programme announced CYBER WARFARE All star superstars Terry Zink looks at the increasingly common Dangerous places to be online phenomenon of hacktivism and details three recent cyber warfare attacks. 3 VIRUS PREVALENCE TABLE page 11 FEATURES EXPLOIT KIT EXPLOSION 4 Evasions in Intrusion Prevention/ In the fi rst of a two-part series introducing exploit Detection Systems kits Mark Davis outlines the basic details of the dime-a-dozen kits used in drive-by browser-based 11 Botnets, politics and hacktivism – an interesting partnership attacks. page 21 15 ‘Signatures are dead.’ ‘Really? And what about pattern matching?’ RECORD VB100 ON XP In VB’s largest ever VB100 21 TUTORIAL comparative review, a total of 60 Exploit kit explosion – part one products are put to the test on April 2010 Windows XP. John Hawes has all 23 COMPARATIVE REVIEW the details. page 23 VB100 – Windows XP SP3 68 END NOTES & NEWS ISSN 1749-7027 COMMENT ‘There is often little Troyak-AS resumed service under a new upstream provider, and this pattern was repeated numerous times. incentive for domain These less than dramatic results beg the registrars or hosting (multi)-million-dollar question: are such takedown providers to make efforts an exercise in futility? it more diffi cult for Certainly if one focuses only on short-term statistics, the answer would appear to be ‘yes’. However, if one criminals to obtain focuses on some of the precedents set during the fi rst services.’ quarter, tangible long-term impact may become a reality.
    [Show full text]
  • APCERT Annual Report 2012
    AAPPCCEERRTT AAnnnnuuaall RReeppoorrtt 22001122 APCERT Secretariat E-mail: [email protected] URL: http://www.apcert.org 1 CONTENTS CONTENTS ........................................................................................................................... 2 Chair’s Message 2012 ............................................................................................................ 4 I. About APCERT ................................................................................................................... 6 II. APCERT Activity Report 2012 ...................................................................................... 12 1. International Activities and Engagements 12 2. Approval of New General Members / Full Members 16 3. APCERT SC Meetings 16 4. APCERT Study Calls 16 5. APCERT Information Classification Policy 17 III. Activity Reports from APCERT Members ................................................................... 18 Full Members 18 1. AusCERT Activity Report 18 2. BKIS Activity Report 20 3. BruCERT Activity Report 24 4. CERT Australia Activity Report 30 5. CERT-In Activity Report 35 6. CNCERT/CC Activity Report 47 7. HKCERT Activity Report 55 8. ID-CERT Activity Report 61 9. ID-SIRTII/CC Activity Report 71 10. JPCERT/CC Activity Report 78 11. KrCERT/CC Activity Report 86 12. MyCERT Activity Report 91 13. SingCERT Activity Report 99 14. Sri Lanka CERT|CC Activity Report 102 15. TechCERT Activity Report 113 16. ThaiCERT Activity Report 122 2 17. TWCERT/CC Activity Report 131 18. VNCERT Activity Report 142 General Members 146 19. bdCERT Activity Report 146 20. EC-CERT Activity Report 150 21. mmCERT Activity Report 154 22. MOCERT Activity Report 160 23. MonCIRT Activity Report 168 24. NCSC Activity Report 179 3 Chair’s Message 2012 The history of CERTs began in 1989 as a result of the Morris worm. As Internet expanded globally, CERTs began to form within the Asia Pacific region and quickly it became clear that collaboration to address challenges that went beyond individual national borders would become essential.
    [Show full text]
  • Microsoft | Security Intelligence Report
    Battling Botnets for Control of Computers Microsoft | Security Intelligence Report Volume 9 January through June 2010 Microsoft | Security Intelligence Report Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMA- TION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2010 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 2 January through June 2010 Authors David Anselmi Jimmy Kuo Navaneethan Santhanam Digital Crimes Unit Microsoft Malware Protection Center Bing Richard Boscovich Scott Molenkamp Christian Seifert Digital Crimes Unit Microsoft Malware Protection Center Bing T.J. Campana Michelle Meyer Frank Simorjay Digital Crimes Unit Microsoft Trustworthy Computing Microsoft Trustworthy Computing Neil Carpenter Bala Neerumalla Holly Stewart CSS Security Microsoft Secure SQL Initiative Team Microsoft Malware Protection Center Greg Cottingham Daryl Pecelj Adrian Stone CSS Security Microsoft IT Information Security and Risk Management Microsoft Security Response Center Joe Faulhaber Anthony Penta Matt Thomlinson Microsoft Malware Protection Center Microsoft Windows Safety Platform Microsoft Security Response Center Vinny Gullotto Paul Pottorff Jossie
    [Show full text]
  • Generic Binary Unpacking with Orders-Of-Magnitude Performance Boost
    Session 3A: Binary Analysis CCS’18, October 15-19, 2018, Toronto, ON, Canada Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost Binlin Cheng∗‡ Jiang Ming∗† Jianming Fu†‡ Wuhan University & Hubei Normal University of Texas at Arlington Wuhan University University Arlington, TX 76019, USA Wuhan, Hubei 430072, China Wuhan, Hubei 430072, China [email protected] [email protected] [email protected] Guojun Peng‡ Ting Chen Xiaosong Zhang Wuhan University University of Electronic Science and University of Electronic Science and Wuhan, Hubei 430072, China Technology of China Technology of China [email protected] Chengdu, Sichuan 611731, China Chengdu, Sichuan 611731, China [email protected] [email protected] Jean-Yves Marion Université de Lorraine, CNRS, LORIA F-54000 Nancy, France [email protected] ABSTRACT dynamic loader, will reconstruct IAT before original code resumes Binary packing, encoding binary code prior to execution and deco- execution. During a packed malware execution, if an API is invo- ding them at run time, is the most common obfuscation adopted ked through looking up a rebuilt IAT, it indicates that the original by malware authors to camouflage malicious code. Especially, most payload has been restored. This insight motivates us to design an packers recover the original code by going through a set of “written- efficient unpacking approach, called BinUnpack. Compared to the then-executed” layers, which renders determining the end of the previous methods that suffer from multiple “written-then-executed” unpacking increasingly difficult. Many generic binary unpacking unpacking layers, BinUnpack is free from tedious memory access approaches have been proposed to extract packed binaries without monitoring, and therefore it introduces very small runtime over- the prior knowledge of packers.
    [Show full text]
  • Threatblogger Footsloggers Review 2012
    December 2012 Feature Article: ThreatBlogger FootSloggers Review 2012 Table of Contents ThreatBlogger FootSloggers Review 2012 ..................................................................................................................3 ESET Papers and Articles in 2012............................................................................................................................. 10 The Top Ten Threats of 2012 ................................................................................................................................... 12 Top Ten Threats at a Glance (graph) ....................................................................................................................... 15 About ESET .............................................................................................................................................................. 16 Additional resources ................................................................................................................................................ 16 ThreatBlogger FootSloggers Of course, other social media were targeted too, as Stephen Review 2012 pointed out in Tricky Twitter DM hack seeks your credentials, malware infection, and more. David Harley, ESET Senior Research Fellow In fact, scams were a very prominent feature of the January 2012 on the ThreatBlog was far too busy to do justice to in a threatscape: the first blog of the year, with some input from fairly short article: inevitably, I’ll have to leave out some ESET Ireland’s
    [Show full text]