Jump to content
New Members Read more... ×

Search the Community

Showing results for tags 'anti-virus'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 23 results

  1. Kaspersky [Medicine-Discussion-Knowledge Base Info] ================================================================= Official Download Links: ---------------------------------------- Download Links: Kaspersky 2018 MR0 18.0.0.405ab [en-us] l KIS 18.0.0.405ab l KAV 18.0.0.405ab l KTS 18.0.0.405ab l KFA 18.0.0.405ab l release notes l Alternative Direct Download Links: http://txt.do/dkw40 Removal tool for Kaspersky Lab products l 91 Days OEM Trial Keys ================================================================= Kaspersky 2017 MR0 17.0.0.611abcd en-us l KIS 17.0.0.611abcde l KAV 17.0.0.611abcde l KTS5 17.0.0.611abcde l KSOS 17.0.0.611 l release notes l Kaspersky KAV,KIS,KTS 2017 Inc. Patch E Without Secure Connection [English] Kaspersky 2016 MR1 16.0.1.445 en-us l KIS 16.0.1.445 l KAV 16.0.1.445 l KTS5 16.0.1.445 l release notes l Kaspersky 2015 MR2 15.0.2.361 en-us l KIS 15.0.2.361 l KAV 15.0.2.361 l KTS5 15.0.2.361 l release notes l ================================================================= Kaspersky 2017 17.0.0.611 MR0 Other Available Languages Official Download Links Kaspersky 2016 16.0.1.445 MR1 Other Available Languages Official Download Links If you already had previous version of Kaspersky I strongly suggest to use Removal tool to Uninstall Kaspersky Lab products >>> [More Info & Download Link] KIS/KAV 2014-2015-2016-2017 90 Days OEM Trial Keys: ---------------------------------------------- ================================================================= Kaspersky 2016 Activation Medicine: ----------------------------------- Kaspersky Reset Trial 5.1.0.39 [Multi]: ----------------------------------------- OS: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003Bit OS: 32 (x86), 64 (x64) Development Team: leo1961 >> , Streamdat, Maksim1876. : ) Interface Screenshots: Supported anti-virus products / Version History Instruction: ------------ Download Link: ------------- Kaspersky Reset Trial 5.1.0.39 ================================================================= Kaspersky Promotions / Giveaways: ============================ Kaspersky Total Security - Multi-Device 90 Days Activation Code ================================================================= Kaspersky 2015 15.0.2.361 MR2 >>> ================================================================= Kaspersky Tools/Important Post Replies/Knowledge Base Information's: ------------------------------------------------------------ Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky 2015 15.0.2.361 MR2 (Android) Kaspersky Antivirus & Security Kaspersky 2018.0.0.405 Technical Release With Patch "A" (en-US) ------------------------------------------------------------ Kaspersky Virus Removal Tool [Free] Some Useful Kaspersky Product Tools Kaspersky 2017 Dark Skin How to Stop and Disable Kaspersky 2017/2018 Secure Connection How to disable daily trial notification in Kaspersky 2018 v18.0.0.x products [KTS/KIS/KAV] How to disable daily trial notification in Kaspersky 2017 v17.0.0.x products [KTS/KIS/KAV] Kaspersky prevents the opening of some sites and Google Search How to restore default settings -Import-Export Setting in Kaspersky Kaspersky Extract Code 1.0.0.9 by leo1961 How to manually install Kaspersky Beta Patch Disable registration requirement in Kaspersky 2016 v16.0.1.x products [KTS-KIS-KAV] How to create exclusion rules in Kaspersky Kaspersky Trial is expired and disable and Self-Defense function not available Kaspersky 2016 Official Useful Info's - Tips - Instructions How to block Internet access using Firewall How to configure Kaspersky Internet Security 2016 for better performance of your computer How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2016 How to change the network status How to disable news/promotional notification How To Disable Last License Notification Time Kaspersky 2016 Private Browsing [New Feature] & Pop Up Blocking Option Version designations of Kaspersky How to enable or disable downloading new versions of Kaspersky Migration Upgrading Between Kaspersky 2016 Product KIS-KAV-KTS Compatibility of Kaspersky Anti-Virus and Comodo Firewall How To Gather Offline Databases From Previous Installed Kaspersky Products How To activate Kaspersky & Bypass Region Mismatch Error Kaspersky Small Office Security 15.0.2.361 Final How to use .lic file to activate Kaspersky Product & activation backup / restore Kaspersky application automatically downloads new version and installs it on top of the current one Kaspersky Rescue Disk 10.x.xx.xx [updated every Sunday] Kaspersky Anti-Virus 2016 for free for three months [French Promotion] Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 16.0.1.445 [EN Localization] How to create and open Sharecode.! ================================================================= november_ra1n 17 July 2015 =================================================================
  2. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 10.3.0.6294 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  3. Discover the Essence of Security Free Protection for PC 360 Total Security Essential 8.8.0.1077 Superior Threat Detection Integrating award winning antivirus engines from 360 Cloud Scan Engine, 360 QVMII AI Engine, Avira and Bitdefender to provide you with the ultimate in Virus detection and protection capabilities. Layered Protection Multiple shields guarantee a secure and peaceful digital experience. Set you worry free from phishing, Trojan and data theft. Premium Features You can execute risky programs in the Sandbox, threats will be kept separate from your system and isolated. Automatic updates and theme support. Real Time Protection and Timely Updates 360 Cloud Security provides real-time protection with the latest virus definition updates and threat indexes provided seemlessly so that your PC is always up to date and secure. 8.8.0.1077 Mar 7, 2018 (Latest) Fixed: Bug fixes 8.8.0.1076 Feb 24, 2018 Fixed: Bug fixes 8.8.0.1073 Feb 2, 2018 Add: Premium Membership - Complete protection without Ads and Lively theme to dress up your Total Security Essential Fixed: Bug fixes 8.8.0.1050 Dec 25, 2017 Fixed: Bug fixes 8.8.0.1049 Nov 27, 2017 Fixed: Bug fixes 8.8.0.1047 Nov 16, 2017 Added: Fully support Windows 10 Autumn Creators Update 8.8.0.1043 Aug 2, 2017 Fixed: Bug fixes 8.8.0.1042 Jul 14, 2017 Added: Internet Protection for WebExtensions in FireFox Fixed: Bug fixes 8.8.0.1036 Jun 6, 2017 Fixed: Bug fixes 8.8.0.1033 Apr 24, 2017 Fixed: Bug fixes Added: Support Windows 10 Creators Update 8.8.0.1020 Aug 10, 2016 Added: Support Windows 10 Anniversary Update Fixed: Bug fixes 8.2.0.1039 May 11, 2016 Fixed: Bug fixes 8.2.0.1038 Apr 28, 2016 Fixed: Bug fixes 8.2.0.1035 Apr 22, 2016 Fixed: Bug fixes 8.2.0.1034 Apr 20, 2016 Fixed: Bug fixes 8.2.0.1031 Feb 26, 2016 Added: Language - German Added: Potentially Unwanted Program(PUP) blocking Added: Support scanning iOS IPA files infected with Xcode Ghost Added: Virus Scan - Support Rar5 file type(Archive file) Added: Virus Scan - Support IPA file type(iOS installer package) Added: Virus Scan - Item detail for scan result Fixed: Bug fixes 7.2.0.1027 Dec 17, 2015 Fixed: Bug fixes 7.2.0.1025 Nov 14, 2015 Added: Support Windows 10 TH2(Build 10586) Fixed: Bug fixes 7.2.0.1021 Sep 21, 2015 Added: Support scanning iOS IPA files infected with Xcode Ghost 7.2.0.1020 Sep 18, 2015 Fixed: Bug fixes 7.2.0.1019 Sep 3, 2015 Fixed: Bug fixes 7.2.0.1018 Aug 17, 2015 Fixed: Bug fixes 7.2.0.1012 Jul 29, 2015 Added: Fully support Windows 10 Added: Windows 10-styled Skin Added: Data Hijacking Protection Added: Malicious root certificate cleanup Fixed: Bug fixes 6.6.1.1014 Jun 1, 2015 Added: Language - Vietnamese Added: Language - Portuguese Added: Language - Simplified Chinese Added: Language - Japanese Added: Language - Hindi Added: Display Language Changing Added: Scheduled Scan Added: Shutdown after Virus Scan Added: Internet Protection for Chrome 64bit Added: Internet Protection for Opera Browser Added: Internet Protection for Yandex Browser Added: Virus Scan in Safe Mode Fixed: Bug fixes 6.0.0.2016 Apr 30, 2015 Fixed: Bug fixes 6.0.0.1022 Apr 7, 2015 Fixed: Bug fixes 6.0.0.1021 Mar 17, 2015 Active Protection Virus Scan Sandbox Theme Non-administrator support Multi-language support: English, Russian, Spanish, Turkish, Traditional Chinese For full package:Click here to download Virus Database Keeping your virus database up-to-date is critical to detect and eliminate the latest threats. Download the latest Avira and BitDefender's virus database to shield your PC against the newest virus. download-free-virus-database AVIRA: Click here to download download-free-virus-database BITDEFENDER: Click here to download
  4. Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky Small Office Security 5 Build: 17.0.0.611.0.95.0 Date: 7/4/2016 More Screenshots: Release Notes WHAT'S NEW IN KASPERSKY SMALL OFFICE SECURITY Download Links: ============== Kaspersky KAV,KIS,KTS,KSOS 2017 Inc. Patch D Without Secure Connection ENG http://textuploader.com/d5e91 Thanks to @vkarthik posting files.. : ) Offline Download Links [All Available Languages]: https://www.kaspersky.com/small-business-security/downloads/small-office-security ============================================================================ Medicine: Kaspersky Reset Trial 5.1.0.35 [Multi] see the link in dedicated Kasperksy Topic posted there --> ============================================================================ KSOS 5 --> 90 days Trial Keys 5 Device: ============================================================================
  5. Chancer

    Malwarebytes on a server

    I have Malwarebytes installed on a couple of servers. I am using the standard edition. I am getting the message that there is an update. When I try and install the update I am told that it isn't compatible with server OSs. I know there is a Malwarebytes edition that is suitable for severs. I have a double edged question; Is there a way to install and update the standard edition on a server, or, is there any medicine for the server edition?
  6. viettungvuong

    Get Key NS/NSBU 90 Days for Free

    First you need to download: Norton Security with Backup 90 Days Trial. Then VirtualBox, you can search it on Google. Finally, you will need a Windows 7 Installation Disc to install on virtual machine, download it here. You don't need to activate it after the installation. 1. Install Windows 7 on virtual machine created by VirtualBox. 2. Install NSBU into your virtual machine. 3. After the installation of NSBU, don't activate it now. Take a snapshot of the virtual machine first: 4. After step 4, now create a Norton account using NSBU and let it activate. After NSBU being activated, close the virtual machine. 5. On real machine, open this page and sign into your Norton account that you created at step 4. 6. Click Services and copy the Serial number: 7. Replace XXXXXXX of the address below with the Serial number at step 6, after that, open the new address with the replaced last 7 digits: updatecenter.norton.com/auto-update?PROD=Norton%20AntiVirus&SKUP=20036782&SKUM=20036782&PRODID=0000013a&OSVER=5.1&PSN=XXXXXXX 8. Click Continue. 9. Copy the link like this: Example: lcdls.symantec.com/767266912/AJaT9i0VE0QYGBTCK2V7W/joLz+AAAVGCD1w7g/feEyLUCDCfwEYD%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~/N360BetaDownloader.exe?LNG=eng-USA&latest=true&inject=false 10. Delete &infect=false in the link above, like this: lcdls.symantec.com/767266912/AJaT9i0VE0QYGBTCK2V7W/joLz+AAAVGCD1w7g/feEyLUCDCfwEYD%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~%2F%26~/N360BetaDownloader.exe?LNG=eng-USA&latest=true 11. Download the file from the address. 12. Open the file using Notepad. 13. Press Ctrl+F and find the word "key" 2 times, the key will be there: If you want to get more key, just restore the snapshot of virtual machine and do it again!
  7. Avira has released Avira Free Security Suite 2017, a comprehensive bundle of its antivirus, antiphishing, VPN and speedup products. The package includes four products. Avira Free Antivirus keeps malware at bay, Avira Browser Safety blocks dangerous links, Avira Phantom VPN encrypts web traffic and masks your IP address, and Avira System Speedup optimizes your PC’s performance. Avira fans will know these packages already, but the 2017 editions deliver improved anti-ransomware protection, and they’re all managed and controlled from a revamped Avira Connect launcher. The suite has some notable issues. Avira Phantom VPN’s free build works well, but a very tight 500MB/ month data limit means it’s only suitable for occasional light use. Avira System Speedup’s free edition similarly offers a reasonable set of core features -- speed, memory and privacy tweaks, as well as online history management -- but for boot optimization, encryption, secure deletion and thorough drive cleaning, you’ll still need the commercial version. On the plus side, Avira’s core antivirus engine offers better protection than most commercial products, and Browser Safety is a welcome addition which reduces the chance of encountering malware in the first place. Ease of use is another advantage. Setup is faster and more straightforward than many stand-alone antivirus products, and individual tools can be managed from Avira Connect, a simple console which lives in your system tray. And although the new release is called a "suite", it’s really still just a bundle of individual products, so fully customizable. If you decide you don’t want one of the tools, you can uninstall it in the usual way and keep everything else. Avira Free Security Suite 2017 is available now for Windows 7 and later. Article source
  8. How to get Kaspersky Internet Security for Android Free for a Year Requirements: 1. You need a root access --> How to root your Android phone Settings > About phone > Build number Tap on the build number 7 times to order to get Developer Setting Tab the Check the option on USB Debugging and enable it. & Setting --> Security --> Click next to the Unknown Sources to enable it. Now use your favorite rooting program Example of free rooting apps (towelroot): https://towelroot.com/ Or KingoRoot - Homepage:https://tinyurl.com/jd98jdq Install One of those and run the program. After than you can check if you have a root access successfully --> Root Checker Pro 1.6.0 2. You also need another free apps called -- > Freedom v1.4.9 Google Play in-App Purchase You can download directly there -- > https://in-appstore.com/?p=87 Download Link: Alternative Link: Install the Freedom & accept to order to Grand the app.. How to use it: ========================================================== Instruction: ========================= 1. Download Latest Kaspersky Internet Security for Android Google Store - https://play.google.com/store/apps/details?id=com.kms.free&hl=en Or Alternative Download Link: 2. Install and Select Free Version during setup. Finish rest of the ınstallation Update Database and first scan. 3. Start Freedom apps Double Click Kaspersky Internet Security logo and patiently wait till the apps does the necessary job and reopen the Kaspersky 4. On Kaspersky go to the -- > Setting -> Additional -> License -> Hit to Activate premium version 5. Select Purchase A License -- > BUY Click OK to finalize the Activation. Enjoy your Kaspersky Android app 365 days.. Ignore Pending License Check you should be able update your Kaspersky database and use full premium features while Kaspersky is waiting for confirmation forever ....... : ) However final word it is working with charm now, but remember nothing is forever.... : )
  9. More and more, the question being asked about endpoint protection and anti-virus isn’t “who should we use,” but rather, “do we even need anti-virus anymore?” Traditional anti-virus refers to those anti-virus-focused clients who used to be commonplace, like Norton and McAfee. While that method of protection worked in the past, the efficacy of it is starting to decrease, and that’s why some new vendors are arguing that, overall, anti-virus is dead. The anti-virus past Traditional anti-virus safeguards from known viruses and known malware. From a process level, every anti-virus has a unique signature or fingerprint. If you run a piece of malware or a virus through a cryptographic hashing process, it generates a new fingerprint and the anti-virus software keeps a database of all of those fingerprints. If it sees something like a Zeus, or any other anti-virus, it says “I know what you are” and it blocks that. The problem is that each and every very time you change a virus’ source code, even by one character, it generates a new hash or cryptographic signature, which has to be updated and distributed to the endpoints. So, now it has to store a thousand fingerprints, then ten thousand fingerprints, then a hundred thousand fingerprints… As a result, that database on your local machine gets bigger and bigger and bigger. So where the original anti-virus client may have been just 10 megabytes, now it’s 100 megabytes, and it constantly has to update that database signature. Now, it’s even more difficult, not only because there are hundreds of thousands of database signatures, but also because there are polymorphic viruses that change their own code, and it’s just an arms race between the virus and the anti-virus. We beat them, they beat us – it goes back and forth. A two-fold problem Anti-virus manufacturers made good strides in offloading the databases and storing most of the signatures up in the cloud. The anti-virus would identify something suspicious, search the internet, then come back and say whether or not it was a threat. That, however, is processor intensive, memory intensive, and it takes time, even with the speed of the internet. The problem doesn’t stop there. Because of the growing sizes of anti-virus programs, the impact on endpoint security is becoming bigger and bigger. If you look at some of the usual suspects, a lot of times, the cure is worse than the disease – your anti-virus is so big that your machine does nothing except constantly scan files for anti-virus. What now? The shift is now to next generation endpoints. There are really a finite number of ways (around 13-15) to compromise a Windows machine. However, there are n number of variables on those vectors. So, what “next generation endpoint” manufacturers are doing is watching the behavior of software. If the software only has to watch for a smaller number of different processes and behaviors, then that’s much more efficient – it doesn’t have to scan every file, just track that behavior. As a result, if it can block one of those attack vectors, it can shut the whole problem down in advance. Is anti-virus dead? Today, there are some manufacturers that will tell you that anti-virus is dead. While traditional anti-virus may not quite be dead, some would say the funeral isn’t far off. The next generation endpoint security market is a fast growing one, and there are tons of services attached to it for customers and partners who want to get into it. Where this really comes into play is with virtualization. Traditional anti-virus on virtual machines tends to be very problematic due to limiting factors such as disk contention, memory overhead and CPU bottlenecks. Since Windows machines are used by 90% of the world, they’re the biggest target. However, mobile phones, other mobile devices and Macs are becoming more and more prevalent. Everybody has a mobile device and they’re too small to run full anti-virus on, so we’re seeing a lot of small malware. This is where next gen endpoint will really come into its own in the near future. Partners who are educated about and able to deliver solutions around next-gen endpoint will be ahead of the curve. With the combination of malware analytics, application visibility firewalls, SSL decryption, security analytics suites, and cloud access service brokers (CASBs) coming more into play, we can actually start watching who’s doing what, where they’re going, should they be talking to this, should they be talking to that… As we keep saying, it’s defense in depth – you can’t rely on any one thing. So, as cool as malware analytics and the new malware pieces are, they are still part of an overall security strategy that needs to be developed. Different solutions, strategies and approaches to anti-virus and endpoint protection are rapidly appearing. Anti-virus isn’t dead yet, but it may be on its way. For more information about anti-virus and next generation endpoint security, please contact Davitt Potter or your Arrow representative. Article source
  10. Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious, according to two former employees. They said the secret campaign targeted Microsoft Corp (MSFT.O), AVG Technologies NV (AVG.N), Avast Software and other rivals, fooling some of them into deleting or disabling important files on their customers' PCs. Some of the attacks were ordered by Kaspersky Lab's co-founder, Eugene Kaspersky, in part to retaliate against smaller rivals that he felt were aping his software instead of developing their own technology, they said. "Eugene considered this stealing," said one of the former employees. Both sources requested anonymity and said they were among a small group of people who knew about the operation. Kaspersky Lab strongly denied that it had tricked competitors into categorizing clean files as malicious, so-called false positives. "Our company has never conducted any secret campaign to trick competitors into generating false positives to damage their market standing," Kaspersky said in a statement to Reuters. "Such actions are unethical, dishonest and their legality is at least questionable." Executives at Microsoft, AVG and Avast previously told Reuters that unknown parties had tried to induce false positives in recent years. When contacted this week, they had no comment on the allegation that Kaspersky Lab had targeted them. The Russian company is one of the most popular antivirus software makers, boasting 400 million users and 270,000 corporate clients. Kaspersky has won wide respect in the industry for its research on sophisticated Western spying programs and the Stuxnet computer worm that sabotaged Iran's nuclear program in 2009 and 2010. The two former Kaspersky Lab employees said the desire to build market share also factored into Kaspersky's selection of competitors to sabotage. "It was decided to provide some problems" for rivals, said one ex-employee. "It is not only damaging for a competing company but also damaging for users' computers." The former Kaspersky employees said company researchers were assigned to work for weeks or months at a time on the sabotage projects. Their chief task was to reverse-engineer competitors' virus detection software to figure out how to fool them into flagging good files as malicious, the former employees said. The opportunity for such trickery has increased over the past decade and a half as the soaring number of harmful computer programs have prompted security companies to share more information with each other, industry experts said. They licensed each other's virus-detection engines, swapped samples of malware, and sent suspicious files to third-party aggregators such as Google Inc's (GOOGL.O) VirusTotal. By sharing all this data, security companies could more quickly identify new viruses and other malicious content. But the collaboration also allowed companies to borrow heavily from each other's work instead of finding bad files on their own. Kaspersky Lab in 2010 complained openly about copycats, calling for greater respect for intellectual property as data-sharing became more prevalent. In an effort to prove that other companies were ripping off its work, Kaspersky said it ran an experiment: It created 10 harmless files and told VirusTotal that it regarded them as malicious. VirusTotal aggregates information on suspicious files and shares them with security companies. Within a week and a half, all 10 files were declared dangerous by as many as 14 security companies that had blindly followed Kaspersky's lead, according to a media presentation given by senior Kaspersky analyst Magnus Kalkuhl in Moscow in January 2010. When Kaspersky's complaints did not lead to significant change, the former employees said, it stepped up the sabotage. INJECTING BAD CODE In one technique, Kaspersky's engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal. Then, when competitors ran this doctored file through their virus detection engines, the file would be flagged as potentially malicious. If the doctored file looked close enough to the original, Kaspersky could fool rival companies into thinking the clean file was problematic as well. VirusTotal had no immediate comment. In its response to written questions from Reuters, Kaspersky denied using this technique. It said it too had been a victim of such an attack in November 2012, when an "unknown third party" manipulated Kaspersky into misclassifying files from Tencent (0700.HK), Mail.ru (MAILRq.L) and the Steam gaming platform as malicious. The extent of the damage from such attacks is hard to assess because antivirus software can throw off false positives for a variety of reasons, and many incidents get caught after a small number of customers are affected, security executives said. The former Kaspersky employees said Microsoft was one of the rivals that were targeted because many smaller security companies followed the Redmond, Washington-based company's lead in detecting malicious files. They declined to give a detailed account of any specific attack. Microsoft's antimalware research director, Dennis Batchelder, told Reuters in April that he recalled a time in March 2013 when many customers called to complain that a printer code had been deemed dangerous by its antivirus program and placed in "quarantine." Batchelder said it took him roughly six hours to figure out that the printer code looked a lot like another piece of code that Microsoft had previously ruled malicious. Someone had taken a legitimate file and jammed a wad of bad code into it, he said. Because the normal printer code looked so much like the altered code, the antivirus program quarantined that as well. Over the next few months, Batchelder's team found hundreds, and eventually thousands, of good files that had been altered to look bad. Batchelder told his staff not to try to identify the culprit. "It doesn't really matter who it was," he said. "All of us in the industry had a vulnerability, in that our systems were based on trust. We wanted to get that fixed." In a subsequent interview on Wednesday, Batchelder declined to comment on any role Kaspersky may have played in the 2013 printer code problems or any other attacks. Reuters has no evidence linking Kaspersky to the printer code attack. As word spread in the security industry about the induced false positives found by Microsoft, other companies said they tried to figure out what went wrong in their own systems and what to do differently, but no one identified those responsible. At Avast, a largely free antivirus software maker with the biggest market share in many European and South American countries, employees found a large range of doctored network drivers, duplicated for different language versions. Avast Chief Operating Officer Ondrej Vlcek told Reuters in April that he suspected the offenders were well-equipped malware writers and "wanted to have some fun" at the industry's expense. He did not respond to a request on Thursday for comment on the allegation that Kaspersky had induced false positives. WAVES OF ATTACKS The former employees said Kaspersky Lab manipulated false positives off and on for more than 10 years, with the peak period between 2009 and 2013. It is not clear if the attacks have ended, though security executives say false positives are much less of a problem today. That is in part because security companies have grown less likely to accept a competitor's determinations as gospel and are spending more to weed out false positives. AVG's former chief technology officer, Yuval Ben-Itzhak, said the company suffered from troves of bad samples that stopped after it set up special filters to screen for them and improved its detection engine. "There were several waves of these samples, usually four times per year. This crippled-sample generation lasted for about four years. The last wave was received at the beginning of the year 2013," he told Reuters in April. AVG's chief strategy officer, Todd Simpson, declined to comment on Wednesday. Kaspersky said it had also improved its algorithms to defend against false virus samples. It added that it believed no antivirus company conducted the attacks "as it would have a very bad effect on the whole industry." "Although the security market is very competitive, trusted threat-data exchange is definitely part of the overall security of the entire IT ecosystem, and this exchange must not be compromised or corrupted," Kaspersky said. Article source
  11. The world of malware was a lot simpler 20 years ago. If you had received your monthly floppy disk containing the latest updates to your anti-virus software you could consider yourself relatively safe. (Assuming you actually took the disk out of the envelope and installed it, of course.) Now we live in a far more complicated world when it comes to cybersecurity. Nevertheless, I often hear people asking the same questions that they would have asked 20 years ago: “What is the latest software version?” and “What was the last identity file you released?” I should stress that being on the latest software versions with regular and live updates are an essential part of modern security. The problem I have with those questions is when those are the only ones being asked. Here is a typical scenario: A user called Brian has a virus on his computer. He believes it must be a new zero-day threat because it got past his anti-virus software and he’s pretty sure he’s using the latest version. Brian understands that no security vendor guarantees 100% protection, so he puts it down to a one-off. He checks that all his computers are using the latest versions and are downloading the latest threat updates. He is happy that they are so goes back to work. The next day another ‘one-off’ attack happens… So why is this happening? Is Brian being targeted by a cybercriminal gang? Does he need to change his anti-virus vendor? The truth is that security is built up of layers, and ensuring the latest versions are being used is only one layer of your security. This fact isn’t new. Imagine you are building a castle – would you consider yourself secure if you only built the walls? What about a moat, battlements, soldiers, catapults, a drawbridge, and so on…? Now imagine you are Brian and you are using the latest next-generation, shiny new anti-virus software. Are you safe if: You aren’t regularly deploying the latest security patches? You disabled a security feature after a user complained Facebook was slower? You have unprotected mobile devices that can connect to file shares? Your email doesn’t get scanned for viruses and spam? Visitors can access your Wi-Fi, which is on the same network as your servers? Anyone is allowed to turn on macros in Office documents they receive via email? Users can read files they shouldn’t access at all and write to files they shouldn’t change? You don’t require users to choose suitable passwords? You ignore alerts from your security software that are warning you something is wrong? You’ve forgotten about those old XP machines still running in the basement? You can probably think up any number of examples to add to the list. Now imagine if Brian took a more proactive approach to these recent threats. He knows the attack wasn’t detected on his computer, but he isn’t sure if his anti-virus software is following best practice, so he double checks all the settings and corrects some mistakes made by his predecessor. Next he looks at the first virus, which he received on an email. It was a Microsoft Word file with a macro that automatically ran when he opened the file, so he makes changes to stop macros from running without him first allowing it. The second virus he also received over email but this was a JavaScript file. For this he changes his Windows settings to make .JS files open in Notepad by default. He also enables Application Control to stop JavaScript files from being able to run on his machines. Next he looks at his email gateway product. This was upgraded recently but he notices that some of the new security features that came with it haven’t been enabled yet. Next he looks at the access rights of his staff and makes some very overdue changes, including enforcing proper passwords. These are just some examples of the different security layers that Brian has at his disposal. The goal of security software is to stop threats. If the threat can be stopped by the first security layer then that’s great, but it’s not always as easy as that. If an attack succeeds, it didn’t just get past your anti-virus – it got past everything. The best way to stop it from happening again is to understand how it got through and make appropriate changes to prevent a repeat. Article source
  12. Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 16.0.1.445 [EN Localization] 1. Download & Install Latest Kaspersky Free Anti-Virus (KFA) / 365 Ru: http://products.kaspersky-labs.com/russian/homeuser/kfa2016/kfa16.0.1.445ru_9701.exe 2. Activating Free Anti-Virus (KFA) / 365 Ru: Use Russian or Ukrainian Proxies [Make sure choose longest Uptime & Higher Response, Transfer proxy on the list for successful progress] Here is the example of daily updated proxy sides: *** Make sure check the proxy in your browser if its working*** http://www.freeproxylists.net/ http://spys.ru/en/proxy-by-country/ http://www.gatherproxy.com/proxylistbycountry http://www.proxynova.com/proxy-server-list/ http://www.xroxy.com/proxy-country.htm http://www.cool-proxy.net/proxies/http_proxy_list/ Go to the setting --> Additional --> Network Proxy Server Setting Use the working Russian or Ukrainian Proxies same as below: Hit the License Tab then hit to activate Via Proxies see the screenshots below: Allow extra time to get the activation successful screen if does not work change proxy or restart PC try again. Notice: **After Activate do not forget changing back to Automatic Detect Proxy Server Setting.!** Done you get 365 days full activation. ======================================================================================= 3. Localization Language to EN Go to the setting --> Additional --> Self-Defense Uncheck Enable Self Defense: Exit Kaspersky from Taskbar: Go to the registry editor in Windows: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\AVP16.0.1\environment Change the value below to order to localize EN Language: Localization: en LocalizationAuto:0 LocalizationList:en Ins_localization:en Finally restart Kaspersky Free & enable Self-Defense... Done the localization. : ) ======================================================================================= november_ra1n 05 Feb 2016
  13. It has become customary for tech vendors to self-categorize their solutions as “next-gen” in the hope that customers used to buying the “last-gen” can be persuaded to upgrade. They try to muscle analyst firms like Gartner into recommending “next-gen” so they can cast market leaders into the bin of history. Who’d dare to stick with a firewall when Gartner says you need a “next-gen” firewall? Applied to Anti-Virus, though, the “next-gen” moniker is meaningless. AV is, and always will be, AV. Today’s endpoint protection platforms are regularly updated with new signatures and detection engines that together represent the state of the art in pre-breach detection. In other words, if you have an endpoint protection solution you already have NG-AV – it quietly showed up this morning in the latest “.dat” file. Unfortunately it’s not enough. In the 2015 DBIR, Verizon noted that over 70% of breaches used malware crafted to be un-detectable by the victim organization. Attackers evolve faster than EPP vendors can adapt. Detection is a flawed protection strategy. It will fail – with certainty. Turing’s 1936 proof of the Halting Problem was definitive. Though the NG-AV vendors claim to have new math, there really isn’t any. If there were, their products would work better than the incumbents. But they don’t so instead they advance a narrative that against such sophisticated foes even new math has its limits. NG-AV is “faux AV”, and we already know all of its limitations: - A false negative lets the attacker in. The endpoint is breached and you’re none the wiser. - A false positive may be worse – sending the security team scurrying to remediate non-attacked systems, wasting time and money and distracting them from signs of an actual attack. The Target breach is a good example. In today’s cyberscape more than 300,000 new malware variants are discovered daily, much of it polymorphic and crypted to bypass the latest detection methods. Over 97% of malware is polymorphic and unique to a specific attacked endpoint, according to Webroot. It is simply impossible to train or adapt a detector and distribute new signatures or detection engines fast enough. Detection poses an impossible mathematical challenge: “[For malware of size n bytes] …The challenge … is to model a space on the order of 28n to catch attacks hidden by polymorphism. To cover 30 byte [malware] decoders requires 2240 potential matches. For comparison there exist an estimated 280 atoms in the universe.” Pretenders to the NG-AV throne lay claim to machine learning, AI or deep learning to give them an edge. But the major players use these techniques already -- it’s unlikely that a newcomer has an algorithmic lead. Established players also have the advantage of a global footprint and huge R&D budgets. There is simply no room for a “next-gen” in detection – the root of the problem is the false assertion that it is possible to do a decent job of detecting malware before it executes. Post-breach detection is critical. Your organization may already have a breach in progress because your endpoints are likely only protected with today’s “NG-AV”. It is critically important to adopt tools to help you quickly identify signs of compromise. Unlike the “detect to protect” approach, post-breach detection relies on continuous low-level monitoring on each endpoint to correlate events related to application execution, network activity and file system/storage activity to identify tell-tale signs of a breach or of an attacker moving laterally through your network. There are many approaches including centralizing monitoring data within the enterprise, sending it to the cloud (if regulations permit), or autonomous correlation of events on and between endpoints to automatically build a precise view of anomalous activity and permit you to search for indications of compromise. Breaches are not inevitable. Adopting isolation will reduce your attack surface. Virtualization based security is a powerful architectural construct that enables you to reduce the attack surface by micro-segmenting your network and virtualizing workloads in the data center. Even simple network segmentation would have defeated the Target attack. On user endpoints, micro-virtualization rigorously enforces the principle of least privilege using CPU-enforced isolation between tasks. Virtualization hardware enforces isolation and transforms security. Virtualized servers and micro-virtualized endpoints can protect themselves, the applications they run and the enterprise network by reducing the attack surface and discarding the ephemeral by-products of execution every time an application is run – automatically remediating the system whether or not it has been attacked. Isolation revolutionizes detection before a breach: Hardware isolation through virtualization revolutionizes attack detection because the execution environment is so robust that it is safe to permit malware to execute. Virtualization permits detailed recording of memory, file system and registry changes, together with network traffic. Such a system reports only proven attacks, without worries about false alerts, and it provides full forensic detail for the attack, permitting an automatic, real-time search on other endpoints for the same attack. Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts. It can also tell you about unknown zero-day attacks and enable you to quickly search your network for other signs of an attack. Article source
  14. “We’re working with Kaspersky on a fix,” Microsoft says Microsoft has just released a new preview build of Windows 10 Redstone, and while the majority of fast ring insiders will rush to install it, there’s one very important thing to consider when doing so. Kaspersky’s security software isn’t working on this particular build because of a bug, and Gabe Aul, head of the Windows Insider program, has confirmed this today, adding that there’s absolutely no workaround available at this moment. “If you have Kaspersky Anti-Virus, Internet Security, or the Kaspersky Total Security Suite installed on your PC there is a known driver bug that prevents these programs from working as expected in builds from the Development Branch,” Aul has explained, emphasizing that this is the kind of bug that has to be expected in an early build that’s only available to insiders opting for the fastest release. Just switch to Windows Defender Furthermore, Aul has revealed that the Windows development team is already working with Kaspersky engineers on a fix, but for the moment, turning to a different security product is the safest way to go. “We are partnering with Kaspersky to fix this issue for a future release, but at this time there are no known workarounds. While this issue is present, we recommend using Windows Defender or another third party anti-virus product of your choice to remain protected,” Aul says. Windows 10 Redstone build 14271 is part of the development branch, so it’s only aimed at users who want to try out the latest builds compiled by Microsoft. Versions that are included in this branch are usually very buggy, and this is one of the reasons Redmond recommends users to switch to the slow ring if they don’t want to mess with critical issues that could significantly impact performance, reliability, or security. And certainly, this bug is living proof that builds that are part of the insider program are not intended to be used on main PCs, a thing that lots of users out there are already doing. Article source
  15. 360 Internet Security 4.9.0.4900D 360 Internet Security is a lightweight, easy-to-use antivirus solution that ensures your PC free from trojan horses, viruses, worms, adware, and other malicious threats. 360 Internet Security utilizes a triple antivirus engine to keep your system away from the latest threats. By combining the power of the 360 checksum based cloud engine, machine learning cloud QVM engine, and award winning BitDefender local engine; 360 pushes antivirus to an unprecedented level. 360 Internet Security works proactively to alert you when suspicious programs try to access critical system resources like system settings and registries, startup programs, and system directories. Secure browsing and privacy protection are vital. 360 Internet Security keeps you away from phishing sites, blocks malicious downloads, and stops unauthorized keylogger and webcam access programs from stealing your personal information. Key Features of 360 Internet Security: Detect & block virusesSecure shopping, banking & social networkingDownload and run risky programs safelyBlock phishing websites & malicious URLsSecure identity & personal dataFacebook & e-mail supportSandbox -- Programs running in sandbox are isolated from the system to improve security.Trace cleaner -- It will clear traces left by web browsing, documents and playing media.Supports Windows 8.1What's new in this version: Added anti-phishing for IE x64 and IE11Added a new themeCertifications 360 Internet Security is certified by accredited third-party test agencies including Virus Bulletin, West Coast Labs, AV-Comparatives, AV-TEST, OPSWAT, and ICSA Labs. Homepage Download: 360 Internet Security 4.9.0.4900D | 227 MB (Freeware)
  16. *** Important Notice: If you decided to download any other language then US, Canada, UK, Ireland, Australia, New Zealand, France, Germany, Austria, Switzerland, Italy, Spain, Korea, and Japan. when you install the license serial you may get an error `Regional Mismatch` .There is an solution bypass this error converting license serial to license key if any one facing this trouble fell free inform on topic reply i will instruct how to get key files from key serial.
  17. Infosec house Panda Security is looking to Big Data and application monitoring as a means to achieve better malware detection. The launch of Panda Advanced Protection Service (PAPS) is a response to the widely known shortcomings of signature-based anti-virus detection as well as a means for Panda to sell extra services. The technology will be marketed to larger firms as well as offered through cloud tech partners, such as Spanish managed security services firm Indra. PAPS is designed to identify vulnerable apps as well as blocking exploits against trusted apps. The latter function differentiates PAPS from whitelisting technologies from the likes of Bit9, according to Josu Franco, veep of corp development at Panda. PAPS work with a lightweight software agent on endpoints that feeds into a Big Data analytics and classification system backend. The system includes a semi-automated process to deal with false positives as well as a means to generate forensics reports and alerts. The sheer volume of malware production has long outpaced legacy blacklisting techniques based on recognising known bad apps by their signatures. In response security vendors have developed technologies such as heuristics (generic detection of similar malware), whitelisting and cloud-based technologies. Most modern security scanners incorporate all these technologies despite marketing claims by rival vendors to the contrary. However in the cat and mouse game between defenders and virus writers the bad guys are still consistently able to evade detection. Estimates vary but as even the more optimistic suggest that one in five nasties slip past security defences. Brian Dye, Symantec's senior vice president for information security, recently declared that "antivirus 'is dead' and no longer a money maker. Dye made the remarks to the Wall Street Journal is advocating that vendors such as Symantec should focus more or detect or respond rather than protection. Such sentiments reflect the thinking of challengers to more established anti-virus firms, such as FireEye and Imperva, but are surprising coming from Symantec - which still pulls in 40 per cent of its revenue from anti-virus. Panda - like most of its peers - argues that anti-virus technology still has its place as something that's necessary, albeit insufficient. "Anti-virus is a cost-effective means to detect and stop known attacks," said Luis Corrons, technical director of PandaLabs. Diego Navarrete, recently appointed Panda chief exec, told El Reg that anti-virus was here to stay, even though it needed to evolve. "The king is dead. Long live the king," he said. Navarrete claimed that Panda was itself big enough to compete with other vendors that might be looking to all-too fashionable Big Data technologies as a tool for containing the malware threat. Other vendors looking to apply Big Data in the fight against malware include Splunk, Symantec and many others. Source
  18. Real-World Protection Test File-Detection Test Sources: Source1 & Source 2
  19. sweeper240

    Hello Hello

    Hi nsane forums! I just found you because I was looking into different internet security options. Came upon this site with lots a great information. I am very interested in virtualization and security right now because I am building up a new website with wordpress... I know its not the most secure way to do it, but wordpress is easy to develop with and input content so the trick is making it as secure as possible. any help, tips/tricks would be greatly appreciated Thanks -sweeper240
  20. Changes in 2.00.0.1000: Homepage - http://www.malwarebytes.org/premium/Synopsis: The world's most popular anti-malware.How to install: extract to desired location, launch AntiMalwarePortable.exeMinimal requirements: Windows XP SP2 or newer, 32/64Dependencies: Administrative PrivilegesLanguages: Bulgarian, Catalan, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Indonesian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, PortugueseBR, Romanian, Russian, Slovak, Slovenian, Spanish, Swedish, Turkish, Vietnamese. *** Note: read the included documentation in Other directory... this is not a toy.. ***AntiMalwarePortable_2.0.0.1000_Multilingual.pafCRC32: 5D98F3B0MD4: 1FFE8E294C47AE8858070F450BACD9BFMD5: 57FC5BC37E473FC5B2503FEF50897A57SHA-1: 63E53B583CDB100885FF283B89FD596DDFF742CESize: 19.1 MB Credit & Source: Fuken Gruven [portablexapp]
  21. Website: http://www.mcafee.com/us/downloads/free-tools/stinger.aspx Downlaod x32: http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger32.exe Downlaod x64: http://downloadcenter.mcafee.com/products/mcafee-avert/Stinger/stinger64.exe Portable: Yes Stealth: No Build Number: 12.0.0.609 Build Date: 31-Oct-2013 Stinger 32bit MD5: eb026fccc234651930df09abe48e94e1 Stinger 64bit MD5: 8329a0c090dc12bdcc56ed4d0d7a55e0 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications. New Detections: • Adware-SaveShare • BrainInstall Enhanced Detections: • BackDoor-FHI • Exploit-PDF.sb.gen • FakeAlert-FRM • FakeAlert-SecurityTool • PWS-ZBot.gen.aux • PWS-Zbot.gen.oj • Vundo.gen.cg • W32/Autorun.worm.dq • W32/Autorun.worm.h Synopsis: Great light-weight portable security tool.Efficient at what it does.Only drag is the required manual daily update.. but don't worry.. i have a remedy :) Remedy: An Online installer for both x32, x64, or USB Mode which installs & updates both versions :)McAfee Stinger is updated daily.. simply re-run the Online installer to update.StingerPortable_x.x_32bit_64bit_English_online.paf.exe Makes application stealthCRC32: 09BC8A80Size: 393 KB (402,676 bytes)Usage Tips Go into Advanced > Settings > select "Report" for "On threat detection".Go into Quarantine > Quarantine Settings > Move location to StingerPortable > Data > Quarantine.
×