Hacker Halted USA Returns to Miami - October 21-27, 2011
PRLog.Org (press release)
The conference will again be held at the Intercontinental Miami and will include advanced infosec training and presentations from some of the world's most ...
by Robert Westervelt
Panda Security researchers document the troubling use of fake antivirus software
Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to PandaLabs, the research arm of Panda Security.
It looks like the cybercriminals behind rogue antivirus software are keeping it fresh, according to the PandaLabs Annual Report 2010 (PDF), which documents many of the common threats and trends that dominated 2010. The researchers found that 40% of all rogue antivirus programs were created in 2010. Of more than 5.6 million individual examples of fake antivirus programs, nearly 2.3 million were detected between January and November of 2010.
According to the report:
If we analyze all the examples classified of this type of threat with respect to all malware contained in our Collective Intelligence database (the automatic system we use to detect, analyze and classify 99.4% of the 63,000 new threats that appear every day), some 11.6% are fake antivirus programs. And let’s not forget that this database contains all the malware detected in the 21 year history of our company, while rogueware only emerged four years ago.
Panda estimates that about 53% of computers users have been infected at some time by malware, even with protection installed and up to date. That leaves plenty of revenue opportunities for fake antivirus peddlers. According to Panda, they’re taking in about $34 million a month.
Here’s the malware type breakdown based on an analysis of 60 million malware files analyzed by Panda:
We’ve written about some of the social engineering attempts used by rogueware pushers. In October there was a report of Rogue antivirus spoofing Google and Firefox attack warning pages. In March, an Amazon phishing scam duped people into downloading a fake antivirus program. PandaLabs also found new rogueware using ransomeware technology.
The good news is that enterprises can benefit by educating end users about the dangers of these programs. Some experts say a little education over time helps. Finally, many standard antimalware programs can detect the phony malware.
by Robert Westervelt
Rebranding part of strategy to streamline operations and expand technology portfolio.
Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets small and midsize businesses, will be called EdgeWave.
San Diego, Calif.-based St. Bernard targets small and midsize businesses with Web security appliances, software and hosted security offerings.
In a statement, Lou Ryan, the company’s CEO and chairman said over the last year the company has taken significant steps in the last year to improve its senior leadership team and bring on additional employees. The company is also expanding its technology portfolio and overhauling its go-to-market strategy, he said.
We believe all of these efforts will produce greater customer satisfaction and increase business growth and shareholder value over the long term.
The changes include the addition of five new executives, the streamlining of operations and retooling of the company’s back office operation, the company said. In addition the company plans an expansion into new markets with new products.
The new name reflects a broader mission that builds on the company’s strong Web and email security foundation, Ryan said.
St. Bernard acquired managed email security supplier Red Condor in August. Red Condor sells hosted and hybrid email spam filtering products to small businesses and ISPs.
Posted by InfoSec News on Jan 13http://www.eweek.com/c/a/Security/StuxnetLike-Trojans-Can-Exploit-Critical-Flaw-in-Chinese-Industrial-Software-296674/
Posted by InfoSec News on Jan 13http://azstarnet.com/news/local/crime/article_4f789a48-1e8c-11e0-929a-001cc4c002e0.html
Posted by InfoSec News on Jan 13Forwarded from: Lionel Garth Jones <lgj (at) usenix.org>
Posted by InfoSec News on Jan 13http://www.pcworld.idg.com.au/article/373172/spectrum_analyzer_catches_exam_cheats_taiwan/