“Vexira Antivirus Earns the Virus Bulletin's VB100 Award on Microsoft Windows Vista Business Edition” plus 3 more |
- Vexira Antivirus Earns the Virus Bulletin's VB100 Award on Microsoft Windows Vista Business Edition
- SMS-Sending Malware Found on Android Phones
- First Trojan Hits Android Phones
- Malware Infection Hits Russian Android Phones
| Vexira Antivirus Earns the Virus Bulletin's VB100 Award on Microsoft Windows Vista Business Edition Posted: 09 Aug 2010 08:47 AM PDT SOURCE: Central Command, Inc.
Aug 09, 2010 11:45 ET Vexira Antivirus Continues to Be Positioned Among the Leading Malware, Spyware and Virus Protection Solutions in the World MEDINA, OH--(Marketwire - August 9, 2010) - Central Command Inc., a leading provider of malware, spyware and virus protection solutions for schools, businesses and enterprises, announced today that Vexira Antivirus was awarded the Virus Bulletin's VB100 award on Microsoft Windows Vista, Business Edition, Service Pack 2 in August, 2010. The Virus Bulletin is one of the foremost antivirus testing and certification organizations in the world and is highly regarded within the antivirus industry. In order to display the VB100 logo, an antivirus product must detect all "In-the-Wild" viruses during both on-demand and on-access scanning and generate no false positives when scanning a set of known clean files using just its default settings. This recent award in August 2010 follows previous VB100 awards obtained in the latest comparative reviews done by the Virus Bulletin in April and June where Vexira Antivirus was awarded the VB100 award on Windows XP, Service Pack 3 and Windows Server 2008. "Vexira Antivirus is clearly demonstrating that it can be positioned among the leading malware, spyware and virus protection solutions in the world. Having been tested and certified by the Virus Bulletin on both desktop and server operating systems in the latest tests in April, June and August, Vexira Antivirus offers business and enterprises complete protection whether it is a laptop, desktop or server. Long known to Vexira Antivirus clients is the quality of Vexira's Antivirus malware, spyware and virus protection and continuing to add the VB100 awards for Vexira Antivirus assures them of their decision to trust Central Command and Vexira Antivirus," said Keith Peer, CEO, Central Command, Inc. Vexira Antivirus is an award-winning, next-generation malware, spyware and virus protection solution specifically designed to defend end-points such as desktops, laptops, netbooks or servers contained within a network with both proactive and reactive malware protection. It is purpose-built to ensure that malware does not penetrate and infect end-points within a network. All Central Command's Vexira product family shares the same underlying technology that protects against malware, spyware and viruses. This ensures consistent protection against malware threats regardless of the operating system being used. About Central Command: Central Command, Inc., founded in 1990, is a privately held corporation that serves schools, colleges, universities, businesses and large enterprises with malware, spyware and virus protection solutions. Visit Central Command at www.centralcommand.com or call 1-888-583-9472 for more information. Central Command and Vexira are trademarks of Central Command, Inc. All other trademarks, trade names, and products referenced herein are property of their respective owners. Click here to see all recent news from this companyFive Filters featured article: "Peace Envoy" Blair Gets an Easy Ride in the Independent. Available tools: PDF Newspaper, Full Text RSS, Term Extraction. |
| SMS-Sending Malware Found on Android Phones Posted: 10 Aug 2010 09:27 AM PDT An SMS-sending piece of malware has hit Android phones, according to a Tuesday note from antivirus vendor Kaspersky Labs. The so-called "Trojan-SMS.AndroidOS.FakePlayer.a" appears as a "normal media player application," according to Kaspersky, but can send SMS text messages to premium numbers without the user's consent. It is the first such piece of malware to target Android devices, and it is already in the wild. Kaspersky, however, did not name the innocuous media player application, although the firm did say that it is about 13 Kbytes in size. Not surprisingly, Kaspersky has added it to its antivirus database, although the company does not currently offer an antivirus solution for the Android OS, just versions of Windows Mobile and the Symbian operating system. An Android version is on the way, however. "The IT market research and analysis organization IDC has noted that those selling devices running Android are experiencing the highest growth in sales among smartphone manufacturers," said Denis Maslennikov, mobile research group manager at Kaspersky Lab, in a statement. "As a result, we can expect to see a corresponding rise in the amount of malware targeting that platform. Kaspersky Lab is actively developing technologies and solutions to protect this operating system and plans to release Kaspersky Mobile Security for Android in early 2011." Maslennikov said that users should keep a close eye on what services an app says it will request before they install it, which implies that it will not spread without a user's permission. Five Filters featured article: "Peace Envoy" Blair Gets an Easy Ride in the Independent. Available tools: PDF Newspaper, Full Text RSS, Term Extraction. |
| First Trojan Hits Android Phones Posted: 10 Aug 2010 12:46 PM PDT
First Trojan Hits Android Phones
Do you like this story?
The malware was detected by security firm Kaspersky, who confirmed the file is named "Trojan-SMS.AndroidOS.FakePlayer.a" and is downloaded as a typical .APK Android app. The company stated this is the first known AndroidAndroid The malware works by posing as a media player app. Once the app is installed on the mobile device, the trojan begins to send SMS messages to premium rate numbers without the device owner's knowledge. Since the trojan's creators are usually the ones on the other end of those premium numbers, they end up profiting from the scam. This SMS-based type of malware is currently one of the most common forms of mobile viruses. SMS trojans have been around for years on mobile phones, even predating the smartphones we all know and love. The first mobile SMS virus appeared in 2004, and the first-ever Android malware (isolated incidents of spyware) popped up in 2009. Kaspersky Lab is currently working on Android-specific antivirus technologies; the company plans to release Kaspersky Mobile Security for Android early next year. Other antivirus apps are available in the Android MarketAndroid Market However, as this platform continues to experience meteoric growth, even outselling iPhones in the first half of this year, more criminals will be attracted to the money-making capabilities of Android viruses. We hope that GoogleGoogle The trojan "media player" that's causing concern today isn't available in the Android Market. Rather, it is "being distributed from a malicious website," according to Kaspersky researcher Denis Maslennikov. "You have to click it manually, there is no drive-by download. If you try to install it, the smartphone will ask you to grant permission for the application to send SMS messages, read or delete data from SD and collect the data about the phone and phone ID." As always, be aware of what you download, especially if you're downloading apps outside the Android Market. Kapersky recommends you pay particular attention to the "permission slip" list of hardware or software an application accesses. These lists are available for every Market and non-Market Android app. If the app needs to make premium-rate SMS or phone calls, you might want to think twice before downloading and installing it. UPDATE: Reader Jon Oberheide emailed us to say he'd gotten a copy of the trojan and dissected its code. On his personal blog, Oberheide writes that the malware "appears to be hastily built off of the HelloWorld example program distributed in the Android SDK." When the user first tries to run the app, he will be told to wait for the media player to find the video library. During this time, the device will send a string of numbers to an SMS shortcode three times. After those three messages are sent, the program won't run again. As Oberheide concludes, "It would be unwise for the trojan to continually barrage the premium SMS number with additional messages from the same user as it would likely raise more red flags." [img credit: laihiu] ![]() Interactive Art Director at Sony Music Entertainment (New York, New York)Jobs Description: Sony Music Entertainment is a global recorded music joint venture with a roster of current artists that includes a broad array of both local artists and international superstars, as well... Five Filters featured article: "Peace Envoy" Blair Gets an Easy Ride in the Independent. Available tools: PDF Newspaper, Full Text RSS, Term Extraction. |
| Malware Infection Hits Russian Android Phones Posted: 10 Aug 2010 04:45 PM PDT By NICK BILTON The adage "Be careful what you wish for" has a modern-day counterpart: "Be careful what you download." Especially on your mobile phone. On Tuesday several mobile security companies were analyzing a Trojan horse that appeared on phones running Google's Android software in Russia. The malicious software, which was discovered by Kaspersky Lab, an antivirus software company, is said to take advantage of Android phones after users install what appears to be a "harmless media player." Once the file is installed the Trojan horse begins sending text messages to premium-rate phone numbers "without the owner's knowledge or consent, resulting in money passing from a user's account to that of the cybercriminals." Lookout, a security company specializing in mobile antivirus software, said in a blog post that the malicious program was the first Trojan horse developed exclusively for the Android platform. But it said the program would not affect Android phone users outside of Russian cell networks. Security experts also noted that the infected application was not available in the Android Marketplace, the store used to download applications for the Android platform. Phone owners must explicitly change a setting on their phone to permit the installation of non-Marketplace applications. Jay Nancarrow, a Google spokesman, said Android applications must get permission from the user before doing things like sending text messages or making phone calls. "We consistently advise users to only install apps they trust," Mr. Nancarrow said in a statement. "In particular, users should exercise caution when installing applications outside of Android Market." Five Filters featured article: "Peace Envoy" Blair Gets an Easy Ride in the Independent. Available tools: PDF Newspaper, Full Text RSS, Term Extraction. |
| You are subscribed to email updates from Yahoo! News Search Results for antivirus To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google Inc., 20 West Kinzie, Chicago IL USA 60610 | |

A local outbreak of a mobile trojan in Russia has shown us something new: The Android operating system might need an antivirus.
0 comments:
Post a Comment