In past, I’ve shared with you many free malware removal tools and today I’m going to share with you another removal tool called FreeFixer.
FreeFixer is a free removal utility which will help you delete potentially unwanted software such as viruses, trojans, spyware, adware, and rootkits.Read Full Post | Make a Comment ( Comments Off on FreeFixer-Another malware Detection and Removal Tool )
Researchers at Symantec have discovered links to Rogue anti-Virus/malware software via poisoned search results for news related to the earthquake and subsequent tsunami off the coast of Western Samoa.Read Full Post | Make a Comment ( Comments Off on Tsunami Related Searches Spread Malware )
Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities,to protect your computer from bots here is a free tool called RUBotted.Read Full Post | Make a Comment ( Comments Off on Trend Micro RUBotted )
Here is another protection software which can be used with your existing antivirus software. It is different from threatfire and mamutu, it was designed to be the first security application focused on protecting your community and it is Immunet.
Using cutting edge technology and leveraging the collective knowledge of the users in the Immunet Cloud, Immunet Protect defends you in real time against thousands of new threats generated every day.Read Full Post | Make a Comment ( Comments Off on Immunet Protects PC and Protects Community )
Malware authors are crafty, they will attempt to infect anyone and anything, and nothing is sacred with them. That’s why the news of Malware targeting CAD (Computer-Aided Design) files isn’t too surprising.
According to information from August 7, and updated detection notes released by Trend Micro this morning, there were indeed Malware attacks on files used by one of the more-known CAD related programs, Autodesk’s AutoCAD.Read Full Post | Make a Comment ( Comments Off on Malware Authors Targeting CAD User )
Now you can manage windows services in smart way with AdvancedWinServiceManager. AdvancedWinServiceManager is the Windows Service Management application which can uncover the services hidden by Rootkits. Services normally runs with ’system’ account thus enabling them to perform higher privilege operations which otherwise cannot be performed by normal processes. Because of these advantages, malware applications often implement services to monitor and control the entire system. However as these services can be easily seen, malicious programs use various tricks to hide their services from being discovered and terminated.
In this direction, AdvancedWinServiceManager makes it easy to detect and eliminate such hidden services by using sophisticated anti-rootkit techniques. It also makes it easy to identify malicious services by showing only third party services along with more details such as Company Name, Description, Install Date, File Path etc at one place. All these unique things make it stand apart from built-in ‘Windows Service Management Console’.
- Detection of hidden Rootkit services
- Enhanced user interface with dynamic resize functionality.
- Arrange the services based on various parameters
- Easier detection of malicious service
- Export the services list to standard html format
- Export to File’ option provides easy way to save the displayed service list to html based log file for offline analysis.
- Show services based on status and vendor.
- Option to start, stop, enable or disable services with just a click.
- Displays detailed information for each service
System Requirements : Windows 2K, XP, 2003, Vista
Download AdvancedWinServiceManager (220KB)| Freeware
For more information visit here
Read Full Post | Make a Comment ( Comments Off on Manage Windows Services in Smart Way )
Just as we were getting ready to declare victory over Conficker (and settling in for a long battle with Gumblar), along comes Nine-Ball, another difficult-to-defeat offensive that hijacks Web sites and tries to load malware onto a user’s PC. The worm has a trick up its sleeve, repeat visitors to infected sites are dumped to Ask.com, a sneaky move that prevents security experts and investigators from being able to discover too much about the host of the malware.
What is Nine-Ball?
Nine-Ball is a multi-layered Web browser attack targeting legitimate Web sites to redirect users to malicious sites owned by the attacker. The downloaded malware attempts to infect user’s computer through a number of exploits including Adobe Reader, QuickTime, Microsoft Data Access Components (MDAC) and AOL SuperBuddy.
The attack name "Nine Ball" refers to the name of the final landing page which is full of malicious drive-by exploits that are automatically downloaded to computers without user’s consent or knowledge. Once infected, anything the victim types could be monitored and used to commit identity theft, such as stealing credit card numbers, passwords or other sensitive data.
How does the threat work?
1. Victim visits legitimate infected site.
2. Victim is redirected to a series of different sites owned by attacker.
3. The final redirect is to a malicious drive-by download site, which attempts to download malware to victim’s computer through a number of exploits including MDAC, AOL SuperBuddy, Adobe Reader, and QuickTime exploits.
4. The malicious programs typically attempt to steal information from the victim via a keystroke logger.
5. Once a user has already visited the malicious web page, these repeat visitors are re-directed to the search engine site Ask.com. We assume this design is a technique to evade investigation.
According to Internet security firm Websense , Nine Ball has already compromised over 40,000 Web sites.
There is currently no sure-fire way to protect yourself from or clean up an infection by Nine-Ball (except reinstalling Windows). All you can do is to make sure that all your software packages, including those targeted by the attack, are up-to-date, and to install the appropriate security software.
Read Full Post | Make a Comment ( Comments Off on Another Major Web Threat : Nine-Ball Compromises More Than 40,000 Legitimate Websites )
« Previous Entries