Blog

Home/Blog/
29 05, 2014

The Magic of KAVremover

By |May 29th, 2014|Categories: Security, Tech News, Virus Alerts|0 Comments

This post was originally published on this site

If you have been following our blog for a while, you know something about what problems you may encounter installing our products and how to solve them. We have already examined what happens when the system requirements are not observed, but there is another common reason why installation may fail. Here in Kaspersky Lab Technical Support, we call it “leftovers”. For those who speak literary English, we will paraphrase it as “system files and registry keys remaining after a previously installed Kaspersky Lab product had been removed.” If a previous version of a product was not uninstalled completely, you may be unable to install a newer version.

44

Where do the leftovers come from? First of all, they may appear because of the operating system errors. If your Windows copy is damaged and works incorrectly, it may result in the malfunction of the Windows Installer […]

This post was originally published on this site

29 05, 2014

Trustwave Global Security Report Is Bursting With Valuable Data

By |May 29th, 2014|Categories: IT Industry, Security, Tech News|0 Comments

This post was originally published on this site

Trustwave Global Security Report 2014

Are you in charge of your company’s Internet security? Do you manage the people who are? Then you should read the 2014 Trustwave Global Security Report. Don’t be put off by its size (nearly 100 pages). The report is formatted like a giant infographic, so it’s easy to grasp the facts it presents. In fact, even if you have nothing to do with managing website security, you may want to give it a read. Here are some of the high points.

How’d They Get In?
The data for this report comes from almost 700 Trustwave breach investigations in 2013, along with data from their operations centers, security telemetry, and research. 85 percent of the breaches made use of vulnerabilities in third-party tools, among them Java, Flash, and Adobe Reader. 85 percent! It’s not enough to to put Windows Update in automatic […]

This post was originally published on this site

29 05, 2014

Save up to 85 percent on PC games, $30 off PS4

By |May 29th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

Heads up Downloaders, you can now get a brand new Sony PS4 for just $370 on eBay. That’s $30 off the regular price. This is the lowest price we have seen and most likely won’t last long.


On another note, GameStop is having its PC Download Spring Sale from May 19 — June 2. Save up to 85 percent on hundreds of PC titles.

There are almost 400 games in GameStop’s sale catalog, but here are some notable deals on editors’ favorites. More info over at GameStop.

RPG

  • The Elder Scrolls Skyrim V — $9.99
  • Mass Effect Trilogy — $9.89
  • Dark Souls: Prepare to Die Ed. — $8.99

Adventure

  • Assassin’s Creed IV Black Flag — $29.99
  • Tomb Raider Complete Pack — $17.98
  • Thief — $29.99

Sandbox

  • Fallout New Vegas Ultimate Ed. — $11.99
  • Far Cry 3 — $7.49
  • Saints Row IV — $19.99

Survival and Horror

29 05, 2014

Your MasterCard Suspended for Fraud? It’s a Scam.

By |May 29th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

1-800-scammer

Scammers are calling unsuspecting consumers on the telephone to steal credit card numbers. If you get such a call, just hang up and do not engage.

Cyber-criminals employ various tools and techniques to launch their scams, including malware, hacked websites, and bots. They also like social engineering, because it is so effective. When you get an email from a friend stranded in a foreign country needing some money to get home, your first instinct is to help. When you are surfing the Web and you suddenly see a pop-up window telling you your computer has been infected, you get nervous at the prospect of losing all your important files. And when someone calls your phone claiming you—or your loved ones—are about to be arrested because of overdue taxes, it’s hard not to panic.

Let’s face it, fear sells.

“Probably the best way to react is to relax first.  High […]

This post was originally published on this site

29 05, 2014

New app helps you find a lookalike for Fido

By |May 29th, 2014|Categories: Applications, Tech News|0 Comments

This post was originally published on this site

The PetMatch app uses patented image-recognition technology to find you a pet that looks like one in a photo you share.
The PetMatch app uses patented image-recognition technology to find you a pet that looks like one in a photo you share.

    • New PetMatch app lets you upload photos to find a lookalike for a dog or cat
    • App’s photo-recognition searches PetFinder for the closest match
    • It’s currently available only for Apple mobile devices

(CNN) — Are you missing a beloved four-legged friend from the past? Or, on a far sillier note, would you like your very own Grumpy Cat or Doge?

A new app aims to help you find a lookalike for your departed or dream pet by using photo-matching software to find the closest match in your area.

PetMatch lets you upload a picture of a dog or cat, […]

This post was originally published on this site

29 05, 2014

HP service automation tools make it easier for IT staffs to work with Chef, OpenStack

By |May 29th, 2014|Categories: Cloud Computing, IT Industry, Tech News|0 Comments

This post was originally published on this site

IDG News Service – Hewlett-Packard has integrated its service automation programs with IT configuration and management programs Chef and OpenStack, a move that could make it easier for IT staff to work with these open source applications, often used by individual lines of business.

“We’re giving a lot of focus to open source technologies like Chef and OpenStack,” said Manoj Raisinghani, HP software senior director of global product marketing for automation and cloud management. As a result, “this allows the IT guy to work much more closely with the line-of-business owner.”

In June, HP will release new versions of HP Cloud Service Automation (CSA version 4.1), Operations Orchestration (OO 10.1), and HP Server Automation (SA 10.1).

The company will also launch a new package using these programs, called the Orchestrated Datacenter, that allows organizations to automate many of their data center operations. The package can be used to control physical servers, virtual […]

This post was originally published on this site

29 05, 2014

Buyer (and Seller) Beware: eBay Suffers Data Breach

By |May 29th, 2014|Categories: Security, Tech News, Virus Alerts|0 Comments

This post was originally published on this site

eBay Inc., the well-known digital auction house where users can purchase anything from concert memorabilia to an automobile, announced on Wednesday that the company suffered a cyberattack. The attack that occurred in late February and early March (but was first discovered 2 weeks ago), compromised a database containing encrypted passwords, email addresses, physical addresses, phone numbers and dates of birth, according to the company’s official public statement.

eBay is urging its 150 million active users to change their passwords immediately. The company said there’s no evidence that the compromise has led to unauthorized activity on user accounts. Nor has the breach given hackers access to financial data, which is stored and encrypted on a separate database. Finally, no information used on PayPal, a subsidiary of eBay Inc. that allows for hassle free payments online, was compromised.

The attack was first detected two weeks ago after a “small number of […]

This post was originally published on this site

29 05, 2014

Iranian Keylogger Marmoolak Enters via Backdoor

By |May 29th, 2014|Categories: Security, Tech News, Virus Alerts|0 Comments

This post was originally published on this site

Targeted attacks have several stages, sometimes called the APT kill chain. At McAfee Labs we prefer the model described by Lockheed Martin:

Marmoolak 1

As part of the weaponizing phase, attackers often put a payload into a file that, once installed, will connect in the C2 (command and control) phase to the attacker. A very common payload used by many password-stealing malware is a keylogger. The purpose of keylogging is to capture the users’ keystrokes, and gather credentials and links to internal and external resources. The stolen credentials can later be used to weaponize another file or serve as part of the actions phase of the APT kill chain.

One example we recently ran into is the malware Marmoolak, an Iranian keylogger with the MD5 F09D2C65F0B6AD55593405A5FD3A7D91.

We traced the first appearance of this keylogger to a Middle-East forum:

Marmoolak 2

Although some keyloggers may capture […]

This post was originally published on this site

29 05, 2014

Despite source code leak, Android malware fetches top $5,000 price

By |May 29th, 2014|Categories: Mobile/Wireless Devices, Security, Tech News, Virus Alerts|0 Comments

This post was originally published on this site

Symantec says the iBanking malware is stealing one-time passcodes for banking applications

May 20, 2014
(IDG News Service)

Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding $5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec.

Symantec and RSA published details on their blogs on Tuesday about iBanking, which is being used by two Eastern European cybercrime groups to intercept one-time SMS passcodes used for logging into bank accounts.

IBanking is notable for its wide range of features and defensive measures that thwart analysis by security researchers. It can steal just about any information on an Android device, record calls or forward calls to another phone, Symantec wrote.

The malware often appears in Android app marketplaces as a legitimate banking application. It appears victims who are targeted already have a […]

This post was originally published on this site

28 05, 2014

eBay Database Breached, Forced Password Changes Loom

By |May 28th, 2014|Categories: Tech News|0 Comments

This post was originally published on this site

The online retail and auction giant eBay announced this morning that attackers compromised a database containing encrypted user-passwords and other sensitive information. The company plans to contact affected users via email and post a notification on its website later today. At some point in the near future, users will be forced to change their passwords for that service.

ebay

The company says it does not believe that there has been any unauthorized customer account activity as a result of the breach. Furthermore, eBay Inc. is claiming that user-financial data as well as PayPal information is not at risk because that data – which is also encrypted – is stored on separate, unaffected servers.

“Cyberattackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network,” the company said in a statement. “Working with law enforcement and leading security experts, the company is […]

This post was originally published on this site