Password Security Scanner 1.10

Published by jon 0

This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords.

xpy 1.2.6

Published by jon 0

xpy is a small program which will disable the default threats of your Windows XP installation. Besides the classic antispy features, xpy closes recent security holes like the remote procure call (rpc) service and the distributed component object model (dcom).

Internet Explorer Zero-Day Used in Watering Hole Attack: Q&A | Symantec

Published by Jim 0

Watering hole attacks have been in the news as of late. Symantec published a question and answer blog post to explain exactly what a watering hole attack is, its prevalence and how to prevent an attack .

"A watering hole attack is a method of targeting sites which are likely to be visited by targets of interest. The attacker will compromise the site and inject JavaScript or HTML to redirect victims to additional malicious code. The compromised site is then left “waiting” to exploit users who visit through drive-by downloads."

Microsoft Security Advisory (2794220): Vulnerability in Internet Explorer Could Allow Remote Code Execution

Published by Jim 0

Microsoft announced Saturday that older versions of Internet Explorer (v 6, 7 and 8) are vulnerable to remote execution code that the bad guys are currently using to target those with mainly IE 8.
They are working on the issues and will eventually release a patch, but your best bet is to upgrade to IE 9 or 10 ASAP or even try a different browser like Chrome

RogueKiller 8.4.2

Published by jon 0

RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.

IObit Malware Fighter 1.7.0.0 (1230)

Published by jon 0

IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.

IObit Malware Fighter 1.7.0.0 (1228)

Published by jon 0

IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.

New Trojan for Android can mount DDoS attacks

Published by Jim 0

The Russian anti-virus vendor Doctor Web warns Internet users about a new malicious program for Android. TheAndroid.DDoS.1.origin can carry out DDoS-attacks on various internet resources and send short messages upon a corresponding command from criminals.

As yet it is not known exactly how the virus is spread.

Malwarebytes Anti-Malware 1.70.0.1100 Final

Published by Tim Tibbetts 0

Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. It monitors every process and stops malicious processes before they even start. Over 6 million downloads on Majorgeeks alone!

Kaspersky XoristDecryptor 2.2.116.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

IObit Malware Fighter 1.7.0.0

Published by jon 0

IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.

RogueKiller 8.4.1

Published by jon 0

RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.

Pirate Bay Censorship Backfires as New Proxies Bloom | TorrentFreak

Published by Jim 0

After legal threats from the music industry the UK Pirate Party saw no other option than to shut down their Pirate Bay proxy service. However, as is usually the case with censorship, the Internet has found a way to route around it. Responding to the UK situation Pirate parties in Argentina and Luxembourg have decided to start fresh Pirate Bay proxies.