RSS

Monthly Archives: August 2015

Wikileaks Shows Governments Could’nt Penetrate Comodo Internet Security!

Wikileaks, a non-profit media organisation, helps in providing information to the journalists with true evidence.

There has been a release from Wikileaks about the concealed copies of malware equipped with German surveillance which were known to be the utilities of the intelligence agencies in and around the world to secretly collect information on journalists and political protesters and much more.

FinFisher, a German company which was formerly a part of UK based Gamma Group International that focuses mostly into the production of computer invasion systems, remote monitoring systems, software exploits that involves the interference of communications and transactions from Windows, Linux and OS X, Android and others. FinFisher was known public in December 2011.

Since the release of the first SpyFiles, researchers have found the existence of FinFisher products in and around all the countries of the world, documenting its uses against activists and journalists.

The monitoring software suite is called the FinIntrusion Kit, that incorporates

  • FinSpy: A virus software that permits to access remotely targeting infected machines.
  • FinFireWire: This software allows to download the image of memory from the targeted system
  • FinFly USB: This installs the infected software just by plugging a USB stick onto the targeted machine.
  • FinFly ISP: This installs an ISP level Software that monitors the activities of infected files
  • FinSkype: This software is installed to record video calls and video messages from the targeted system.

FinFisher lets Law Enforcement and Intelligence Agencies to perform a secret deployment on the Target Systems, as a matter of surveillance to access the security of different organizations. The most interested clients are Intelligence Agencies, Law Enforcement Agencies, Military CyberWar Departments and Police Intelligence Agencies.

Ways of Implementation:

  • Technical Surveillance Unit: FinIntrusion Kit interferes the encrypted WiFi protection access to remotely monitor the Gmail and other webmails, and social networking credentials of the targeted Home based wireless networks.
  • IT Security: Clients are on the urge to use FinIntrusion Kit deploys various techniques to compromise the security of computers for defensive purposes.
  • Strategic Use-Cases: The FinIntrusion Kit, as the name, intrudes Targeted Web-Servers to covertly monitor activities

FinSpy Integration: The Finspy gives a fullfledged support for FinFly USB devices, this enables the user to automatically diffuse the generated FinSpy targeted executable program onto the USB

Anti-Virus Testing: The FinFly USB implements different tools, methods and techniques to intrude the Anti-spyware and Antivirus tools. When any of the antivirus products defends the bypassing of Finspy, the agent will come across the following outcome. FinSpy software installation on to the target system will be blocked. The antivirus products displays pop-ups to warn on the suspicious programs which has to be either rejected or accepted by the agent.

There has been consistent updates on the antivirus products and hence the modes of these attacks cannot be specific. Tests are conducted regularly based on the Gamma Quality Assurance, performing checks on the FinFisher products against the latest version of the security products, to research and find out any detection. This is to enhance the performance levels of the FinFisher product that are used to bypass the latest antivirus and antispyware products.

Some of the well known antivirus systems that stands as the strong barrier against the Finfisher products providing a complete quality assurance ambiance

  • Comodo Internet Security Pro
  • Kaspersky Internet Security
  • Norton Internet Security
  • ESET Smart Security
  • F-Secure Internet Security
  • avast! Professional Edition
  • Panda Internet Security
  • AVG Internet Security
  • ZoneAlarm Internet Security Suite
  • BitDefender Internet Security
  • Bullguard Internet Security
  • CA Internet Security Suite Plus
  • McAfee Internet Security
  • Trend Micro Internet Security PRO
  • ClamAV
  • Sophos Security Suite
  • VIPRE® Antivirus + Antispyware
  • F-PROT Antivirus Version
  • G DATA Internet Security
  • Ikarus
  • Mamutu
  • NORMAN SECURITY SUITE
  • Outpost Security Suite Pro
  • RISING Internet Security
  • Spybot Search & Destroy
  • Spyware Doctor
  • Steganos Internet Security
  • Trustport PC Security
  • VirusBuster Internet Security Suite
  • Quick Heal Total Security
  • Windows Defender
  • K7 TotalSecurity
  • Ad-Aware PRO
  • Ashampoo AntiSpyware
  • a-squared Anti-Malware
  • Avira Premium Security Suite
  • Dr.Web Security Space
  • Security Essentials

The companies that were protected with the above mentioned antivirus products were able to defend the interference of FinFisher,

As per Wikileaks, Malware creators have found that Comodo Internet Security Pro has proved for a strong and solid protection combating government malware.

Proud to say that the Comodo Internet Security Pro has been found to be the best. Hats off to the developers.

 
Leave a comment

Posted by on August 27, 2015 in FinFisher, Internet Security

 

Tags: ,

Human expertise filling endpoint security holes that defunct antivirus tools no longer can

Human expertise filling endpoint security holes that defunct antivirus tools no longer can

Endpoint traffic has to be under control to sustain the security defense mechanism in today’s digital world. Though there are a wide range of security tools available, human intervention is mandatory to fix the security flaws of any outdated conventional antivirus software and to know how to protect the endpoints from Malicious attacks.

All of us totally rely on the use of laptops, tablets and mobiles almost for all our day to day needs. Its presence everywhere entails the demand for a higher fold of security that overshoots the traditional security perimeter as the conventional methods do not provide an effective protective mechanism.

Earlier days, these conventional antivirus software were a good source of protective system strong enough to defend any malware attacks. Current malware attacks / vulnerability are intelligent enough to get into the system through phishing mails. They are developed in such a way that when the target victim opens an email attachment or simply click on any of the links that the user finds it in the mail, then he/she will be highly be prone to infection.

The security attacks have possibly been increasing due to the users’ wrong practice of dealing with security issues. Most of the users have an outdated security software that makes the endpoints vulnerable to malware infections. Installing a security software is not just enough to protect the endpoint devices it is also important for the users to keep a check on the updates of the software for any latest security patches. A recent study on human behavior confirms that most of the humans are prone to the phishing emails that they get convinced and click on the attachments and the links and hence get infected. If you are looking at Protecting your Endpoints it is not about relying on the security software completely it is also important to use a proper sense of intelligence.

 

Tags: , , , ,

What is Virus iCodec ?

Icodec Virus:

This virus is a type of spyware that induces the non stopping pop ups interrupting the computer operations. This spyware causes greater destruction and damage, literally interfering the normal operations of the computer, making the computer user to treat that as a challenge. The Icodec virus is known for its intrusive nature that it often displays ads whether you want it or not. Initially check whether the problem is really caused by Icodec virus taking and then make further process to remove it

Guidelines to identify and remove the Icodec Virus:

  • If you find any pop up windows that are not coming from websites that you frequently browse. check if your PC is infected with Icodec virus. This Icodec virus, causes pop-ups informing that your PC is in danger, guiding you to download free antivirus software. These pop ups may vary from adult pop ups to gambling websites. For your information these pop ups that are meant to carry threats hints us with a yellow triangle that flashes on on top corner of the pop up window. Hence be aware.
  • Check whether programs pmsngr.exe and pmmon.exe are running on your PC.
  • While clicking and holding “Ctrl + Alt + Delete” simultaneously, click the process tab, if you identify any pmmon.exe and pmsngr.exe, you can be sure of Icodec virus vulnerability.
  • Start your PC in safe mode to remove viruses. You can do this by holding the F8 key while rebooting your PC. A list of Start options shows up, opt for “Safe Mode”.
  • Take off the Icodec folder that is found on your PC. To remove the Icodec folder, go to the Progarm folder while in safe mode and check for a folder named IcodecPack, once found drag the folder to the Recycle Bin and also delete the contents of the recycle bin. this helps us to independently remove the file.
  • Reboot your PC, change the safe mode to standard mode. If the the symptoms are found appearing back again, start the PC again in safe mode and remove the Icodec folder again.
  • While installing the software, pay close attention as the software installer allows optional installation like HDvid-Codec V9.0 adware. Do not randomly agree to install the optional ones.
  • Prefer customized installation and do not select unknown files, specifically those unknown software that you do not want to download.

In short do not install any software that you are not sure of.

 
Leave a comment

Posted by on August 24, 2015 in Free Antivirus

 

Tags: ,

BuzzFeed, Internet Security and it’s Killer Virus?

BuzzFeed, Internet Security and it’s Killer Virus?

You may be interested in answering a quiz that asks you to think of a character and prompts you to answer its questions or you may be curious in knowing something about a celebrity that you did not know till date or you might follow a friend through Twitter or Facebook, all these might have infected your system. You as a user might not be knowing about your system getting infected at the back end happily interacting over the internet and hence spreading the infection to the next person in a similar way.

At a level of excitement with so much of desire to read the news, makes the BuzzFeed and other similar competitors, to bring a good reach in performance. This is how the hackers have formulated the success behind this type of viral attack. Users do not really understand the real purpose and hence become vulnerable to attack. The online contents showcase a new range of attacks, which has started infecting other news outlets as well. To be more precise, the news that appears on social media sites, through which you are diverted to websites, itself is a virus. It is for sure that almost all the users have been compromised through this BuzzFeed.

Recently in the year 2013, during the month of July, five of the competitors along with BuzzFeed were only identified to make a reach over 53% out of 120 million different visitors of the entire US internet users. After 14 months by September 2014, BuzzFeed Competition has been strikingly doubled, as it now covers 76% of the entire US internet population that is closely equal to 172.5 million visitors.

Sources reveal that the real content of news is loosing its power to attract people as the competitors are ruling over the traditional sources.

Yahoo, CBS Interactive, Ziff-Davis and The New York Times, have found that their popularity over reaching the online news readers have declined during the same period of time. Seemingly, finding a higher position of reach over the internet, is the BuzzFeed by mutating its viral DNA to spread and to survive.

The Attention Economy:

Most of us have a proportionate amount of attention to give. The amount of news that we are looking for seems to grow more. The reality behind the curiosity to know more about the content is for a monetary purpose and hence an American economist by the name Herbert A. Simon has termed this factor as the “Attention Economy”. When revenue totally depends on the advertisements, it is only through these contents, the organizations can earn a lump some amount, so these ads are created on the basis of seeking attention. The flavor of our curiosity adds a spice to the viral ingredient. Online attention makes a way to click and swipe on the content that we are tantalizing to know about it as the simple equation for the BuzzFeed competitors to enhance their financial stability with the enormous amount of stakes.

Tools of the trade:

Attracting the audiences at a consistent level is a great challenge among all the competitors. This simple element on pursuit has been common since printing press till the latest technology. However, the way of putting it across has been changed as per the transforming trends in the mechanics.

All the mechanics are not exclusive. Almost all the portals that have survived have got its authority through channels or sections. However, the subject authority makes the most use of SEO. This helped us to seek attention over the online content in a most successful way in about eight years ago.

Facebook – The bench mark of all media sites:

Facebook has set a benchmark amongst the social media sites, overpowering every other sites. Considering few years back down the line in 2004 it was not in so many people’s attention. Facebook made the words “social media” more popular among the people.

Otherwise these words were not even known to most of the people. May be if you like a picture or a message, you might have shared through IM service, Yahoo! Messenger or AOL IM

Facebook became familiar to the audience between 2007 and 2008. By 2009, it overruled and ripped down the other social media sites with a very well established foundation.

We started overhauling some facts about BuzzFeed Labs, that experimented way through which the online content went viral. According to Jonah Peretti who is a founding member of “The Huffington Post”, He says Huffington Posts sees 3 million visitors within a month in the year 2008, through the concept of Search Engine Optimization..

Through his observation, Peretti found a great impact on the way people shared contents. Learning the elements of attention and curiosity, he further brought in a data driven method to expand the new concept on optimized content that is viral over the social networking sites. The main objective to serve the purpose was to develop the type of content, that people shared often with each other, hence making social networking sites, the significant driver of traffic.

This experiment went unnoticed for many years until and when Peretti got relieved from Huffington Post in 2011 to focus is attention fully on BuzzFeed.

Peretti, shared a few concepts on how to build a social media company, as the audience are now more social. The experiment steam rolled with positive outcomes. As per Quantcast, it has been found that BuzzFeed attracts about 150 to 175 million different visitors a month, out of which about 75% of the traffic is caused by sharing through social media sites like Pinterest, Twitter, Facebook and much more.

Useful Free Security Software:

Comodo Antivirus

Comodo Internet Security Suite

 
Leave a comment

Posted by on August 14, 2015 in Internet Security

 

Tags:

What is ModSecurity ?

What is ModSecurity ?

ModSecurity is a popular open source module for Apache web servers to provide a Web Application Firewall (WAF), a layer of security to shield the web server and the applications running on it from harm or compromise. ModSecurity can be implemented as a Firewall or as a proxy web server for a https://waf.comodo.com you custom build.
ModSecurity monitors and logs HTTP traffic and can potentially control inputs and outputs to and from the web server and applications based on a defined set of rules.

What are ModSecurity Rules?

While the logging and monitoring features have value, the key to ModSecurity ‘s effectiveness is its “rules engine” that controls inputs and outputs based on a set of defined rules. It uses a special programming language that is designed to work with HTTP transaction data. The ModSecurity Rule Language makes it possible to create flexible and customizable rules that protect your servers and applications from harm while allowing uninhibited valid traffic.

ModSecurity Rules

ModSecurity Rule Sets provide protection in the following categories:
1) HTTP Protection: Detecting violations of the HTTP protocol and a locally defined usage policy.
2) Real – time Blacklist Lookups : Utilizes 3rd Party IP Reputation
3) HTTP Denial of Service Protections : Defense against HTTP Flooding and Slow HTTP DoS Attacks.
4) Common Web Attacks Protection : Detecting common web application security attacks.
5) Automation Detection : Detecting bots, crawlers, scanners and other surface malicious activity.
6) Integration with AntiVirus Scanning for File Uploads : Detects malicious files uploaded through the web application.
7) Tracking Sensitive Data: Tracks Credit Card usage and blocks leakages.
8) Trojan Protection: Detecting access to Trojans horses.
9) Identification of Application Defects: Alerts on application misconfiguration.

 
Leave a comment

Posted by on August 5, 2015 in ModSecurity

 

Tags: , , ,