To improve detection capabilities, Spyware Terminator 2.0 now incorporates a database of malicious samples and threats maintained by the SpywareSignatures.com initiative. Compared with 1.9, the Spyware Terminator 2.0 software database is more than double in size.
The rating for stand-alone anti-virus software is based on separately calculated scores in each of four categories: Performance, Specifications, Design, and Price.The Performance score, heavily weighted in the rating, measures not only system speed tests but also the critically important malware detection and disinfection tests. The detection tests are heavily weighted within the performance score.
The amount of malware detected on the internet saw a significant rise during the first half of the year, according to a new report. About 29,700 new web pages were infected every day in June alone, compared with about 5,000 a day earlier in the year, security firm Sophos has revealed in its Security Threat Report publication.
Peer-to-peer file-sharing programs often carry hidden "packages" containing spyware, adware and files infected with viruses, noted a Federal Trade Commission (FTC) official who testified before a U.S. House of Representatives oversight committee on Tuesday.Mary Engle, associate director of the FTCs division of advertising practices, told the House Committee on Oversight and Government Reform that consumer use of peer-to-peer file-sharing technology can "be risky." In addition to the bundled spyware and adware often associated with P2P downloads, she said that P2P users can inadvertently share personal or sensitive files with others.
Over the last few weeks there has been a spate of disclosures related to weaknesses affecting anti-malware software, where a vulnerability in the product could lead to an attacker being able to exploit the underlying system (either through breaking out of a sandbox, or targeting the filtering capabilities of the software).Towards the end of last week several filtering management issues affecting numerous anti-malware solutions were reported in the space of a couple of days which could have negative affects for users trying to scan such files as Windows executables and common archive formats (CAB, RAR, etc).
Mi5 Networks, the web security gateway company, today announced the Webgate Channel Partner Program for resellers looking to tap the market for Secure Web Gateways, which protect organizations from web-borne threats including botnets, spyware, and viruses. The program is designed to attract Best-of-Class regional VARs, while maximizing margins and minimizing channel conflicts. Resellers can now provide customers a complete URL filtering, Web Malware, and Botnet protection solution for the same price as their URL filtering renewal budget. Mi5 Networks sells exclusively through the reseller channel in North America.
A new patent suggests that Microsoft plans to help network administrators fight the spread of malware by developing a network monitoring system that would collect realtime malware data in an effort to prevent malware from spreading on non-protected clients and reduce the time it takes to patch against such malware. Its quite like Windows Defender, but with a (potentially) much quicker response time, and manageable by network admins. We learned of the new patent from reader James Moody, who wrote to us with word of his find.
If PDF and DOC spam wasnot annoying enough, now spammers, malware attackers, and pump and dump schemers are resorting to using Excel xls files to spread their messages.The files are usually contained within zip files but may also just be sent as an xls file attachment.
Signature-based security unable to cope with "zero-minute" threats.Signature-based malware detection techniques are becoming less effective in the face of so-called "malware 2.0" threats, a security firm claimed today."The security space is changing rapidly. We are witnessing a major shift in the anti-malware marketplace moving into a new era of malware 2.0," said Kurt Baumgartner, chief threat officer at PC Tools. "We are now dealing with zero-minute, rather than just zero-day, exploits that have the potential to further evade signature detections."