Blog

petya ransomware

Petya Ransomware – a Hardcore Threat to the Hard Drive

‘Today we have launched the Petya Ransomwear Project’; this is a proud statement from the page that greets a visitor to the TOR website after being infected with this new trojan-ransomware. Unlike other ransom malware that is in circulation at present, Petya does not limit itself to encrypting user files – it essentially locks up …

Petya Ransomware – a Hardcore Threat to the Hard Drive Read More »

heuristic algo

How Anti-virus Heuristic Detection Works

Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is enough to prevent discovery by these methods. Where polymorphic code is susceptible to detection by heuristic anti-virus software capturing a screen-shot on its execution (if this is timed precisely to acquire enough code, then the …

How Anti-virus Heuristic Detection Works Read More »

Security Flaws May Occur in Customized Smartphone Operating Systems

There are four basic levels that combine to make smartphones what they are: Application Layer; Operating System (O.S) Layer; Hardware Layer; Infrastructure Layer Each layer is dependent on those below it for operation. The Operating System is dependent on the top Application Layer (which is the user interface) for primary security. Increasingly, manufacturers and third …

Security Flaws May Occur in Customized Smartphone Operating Systems Read More »

How ZeroAccess Rootkit Takes Control Over PCs

To answer this question, it is necessary to look briefly at how this rootkit operates. The ZeroAccess rootkit is capable of differentiating between and installing on either Windows 32-bit or 64-bit operating systems. It selects one of two different methods of deploying, depending on the target system it finds itself presented with. 32-bit infection method …

How ZeroAccess Rootkit Takes Control Over PCs Read More »

The Use of Hashes in Signature-based Malware Detection

A hash is a fingerprint of a file that is unique for every file. It is almost impossible to compromise an operating system without changing a system file – and with any changes in a file’s characteristics – the hash or signature is also modified. This enables some threats (with recognized, recorded signatures), and corrupted …

The Use of Hashes in Signature-based Malware Detection Read More »

How to Prevent Ransomware: 21 Tips and Tricks

Nowadays ransomware prevention is very important thing to know. Having in mind that submitting the ransom might be the only option for recovering data, users should learn some tricks to keep their virtual machines protected. Over the past years, security companies have created myriads of tools applicable for blocking ransomware from being executed on computers. …

How to Prevent Ransomware: 21 Tips and Tricks Read More »

rogue software

What is Rogue Security Software, Risks and Protection

What is Rogue Security Software? Rogue Security Software, also known as Fake AV (Antivirus) Software, or Rogue Antivirus Software, is a malicious computer program which is illicitly promoted and distributed as a virus removal tool, while it in fact either doesn’t provide any functionality, or downloads additional malware. Following installation, Fake AV applications introduce forged …

What is Rogue Security Software, Risks and Protection Read More »