antivirus

No Picture

How do you react if you receive an email with subject “Your file has been uploaded”?

A spam campaign sending emails from an “Auto ImageService” with the subject “Your file has been uploaded” is making its round on the Internet. The content of the email (see below) is very simple and advertises a link to a photo taken with a digital camera (DCIM stands for Digital Camera IMages) which was allegedly uploaded to some online image service. And now to my question: How do you react if you see such an email in your Inbox ?     I guess, most people would think: “What file? Oh, a photo? Hmm…” And here it goes: – You know…


No Picture

Why do we continue to fail on cyber security

Short answer: Because anyone is hackable due to being ignorant on what security is (of course, until he is hacked). Long answer: Human ignorance,  about everything that might happen and it is not certain to happen. According to Webster.com, the definition of IGNORANCE is: : a lack of knowledge, understanding, or education : the state of being ignorant [noncount] ignorance is bliss — used to say that a person who does not know about a problem does not worry about it In a company, every employee expects the company’s IT department to take care of security. At home as well as at work, people…


No Picture

Is Antivirus really dead? It depends on what you call Antivirus

Every once in a while, someone or some company in the information security industry comes up and says, “antivirus is dead.” This happened again last week, when Symantec’s Brian Dye told the Wall Street Journal that antivirus was dead and that it was no longer a “moneymaker.” http://news.softpedia.com/news/Is-Antivirus-Dead-It-Depends-on-How-You-Look-at-It-440993.shtml Avira Security Expert and Product Manager Sorin Mustaca tells us via email: “This hardly comes as news for anyone in the security industry who’s been in the business for more than a few years. I’ve written in April 2014 in the Virus Bulletin magazine an article called ‘Is the IT security industry up to…


No Picture

What to do if your computer has a virus

So, the unthinkable, the only thing which you always thought that it can’t happen to you did happen: your computer got a virus or more. What to do now? First of all, don’t be scared and think well before taking the next steps. Many people format first their computer and reinstall the operating system or even change their hardware without thinking at the consequences: you lose all your data! Let’s start with a risk analysis of the situation without going into too many technical details. If you have a file infector virus (e.g. W32/Stanit) then potentially any access to other executable files…


No Picture

Microsoft Defender and dangerous alert levels

Description: This program changes various computer settings. Advice: This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you’re not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. Category: Tool       Clicking on the link in the dialog gets you here where it is explained that it is actually a Research Tool.   Research Tool:Win32/EICAR_Test_File Tool:Win32/EICAR_Test_File (?) Encyclopedia entry Published: Mar 08, 2007 Aliases Not available Alert Level (?) Severe Antimalware protection details Microsoft recommends that…


No Picture

The CompTIA Security+ Certification: passed

I’ve had today the exam for the CompTIA Security+ SYS-201 certification and passed it with 828 points out of 900 (min. 750 to pass it). I’ve learnt after the book The CompTIA Security+ 2008 Study Guide, 4th Edition., author Emmet Dulaney. Why this book ? It was recommended by CompTIA on their website and it was cheap 🙂 I started initially with the eBook : The CompTIA Security+ 2008 in Depth, author Mark Ciampa. Remember by posts about the posts : Not all AV software are the same” – CompTIA Security+ 2008 and Cybercriminals from Eastern Europe ? They were…


No Picture

A closer analysis of DE-Cleaner from Symantec

I was curious about how the DE-Cleaner of Symantec works, so I downloaded the software and give it a closer look. I did not dissemble it or anything similar… I simply performed a little black box testing. So, I started it without any internet connection. The result was: no scanning was possible. DE-Cleaner requires an Internet connection. This is an indication that the software is an in-the-cloud scanner. After seeing this, I searched on the website botfrei.de more details. And I found them… yes, indeed the Symantec De-Cleaner needs an Internet connection. This is why the file has the size…


No Picture

Why Intel bought McAfee?

Everybody knows about this acquisition. Now, why did Intel (chip produced) needs a Software Security company ? There are some possible reasons: 1. To enter in a multi-billion market which needs fresh ideas and technologies 2.  To produce better security software which makes use of their multi-core processors 3. Both 4. Add AV in the CPU (or on the board) directly(with some help from the “cloud”) 5. Create an AntiVirus Chip -> move from software to hardware (which they know better) Of course, I vote for 3… Both. But also 4 isn’t so bad 😉 Why ? Well, because there…


No Picture

Quoted (again) on Softpedia.com

The source of the article ist the statistics for July, published in the techblog: “Because of the holiday season, many people started to buy games and spend more time in the social media websites, so the increase in attacking such web sites comes quite naturally,” Sorin Mustaca, manager of international software development at Avira, noted.


No Picture

Quoted in the IT Business Edge

http://www.itbusinessedge.com/cm/blogs/poremba/trustworthy-ssl-certificates/?cs=42832 As Sorin Mustaca, manager of international software development at Avira, explained to me: A Certificate Authority is, by common understanding, an entity having a trust level beyond any doubt. This means that in the case of digital certificates, a CA can generate certificates which are trusted by all parties involved in a communication. Any entity, private or corporate, is allowed to request such a digital certificate, the only proof required is an official identification document. This means that such a certificate can only guarantee that the entity you are communicating with is who she pretends to be. It doesn’t…


%d bloggers like this:

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close