Home » Tag Archives: trojan

Tag Archives: trojan

An Overview of Threats Against Companies in This Year 2014

The number of companies who become victims of cyber attacks are rising on this year. Kaspersky Lab Research and B2B International shows 91% of companies surveyed have been victims of cyber attacks at least once within past 12 months, while 9% Others were targeted attacks, ie planned attacks that aims to infect network infrastructure company or organization.

Breadth of digital devices used in many companies has created ideal conditions for cyber spying and launch a malware to steal corporate data. Its have a great potential so that a malicious program could be replace an informant (insider) to obtain the information.

Main Findings the Corporate Threat in This Year:

  • The unfolding of spyware attacks are associated with various governments
  • Most incidents involving cyber criminals aim to steal information
  • Revealed an attack to the contractor, and not to the big company
  • Emerging new actor in APT attack: cyber-army who undertake cyber spying based-on request

In 2013 revealed some spyware attacks are associated with numerous government agencies, either directly or indirectly. Other actors in terms of cyber threat against corporates is the company that using cyber criminals because their competitors wishing to enter the networks.

Cyber-army perform the operation that usually aimed to stealing information. Another attack aimed to sabotaging – using the malicious programs to delete data or block operations infrastructure.

Some programs specifically Trojan was able to steal money through online banking system. The cyber criminals can hack into the company’s websites and redirect visitors to malicious sites, and this action could damage the company’s reputation. Financial loss is generally caused by DDoS attacks, which can shut down the site public utility companies for a few days. As a result, the client switched to another company and this leads to long-term financial losses.

Beware of Four Signs PC|Laptop Already Infected by Virus

Do not underestimate little suspicion on your notebook. If you find the notebook takes much longer when opening a programs/ ​applications, it is better immediately bought to the nearest service center to analyze and addressed more accurately.

One of the little suspicion above can be caused by many factors, can be due to viruses or notebook just need to upgrade from too many applications that are installed when starting up. The reason is the malware creators today getting smarter hiding their malicious activity in order to devouring your PC computing power silently.

Luckily, there are some “signs” that can help you to determine whether your notebook is infected with a virus or simply outdated. Hopefully some of the following signs may help you in determining the next steps on the notebook.

Pop Up Windows Attacks

Pop-up windows could be an indication of malicious software installed on your computer. Usually Windows pop up is a sign of adware or trojan clicker. Malware creators get money from every pop-up you hit. One or two pop up Windows may not be harmful, but you should be more careful when the pop up happening more and more often. The reason, some pop-up Windows contains malware which harmful to your PC’s.

Several setting on PC/Notebook changed immediately

You work regularly on the same PC, and even if you do not everyday to check setting, you are pretty sure know how to setting up your PC to your liking. So, when this setting suddenly changed without your authorization then you will feel something wrong, right? If this happens to you, it is likely your PC/Notebook has been infected. This sign is usually recognized when you click on an application but eventually leads to another application.

Notebook performance becomes slow

If your notebook has suddenly become slow when opening an applications/programs, it means there is a possibility of your notebook has been infected with viruses. Some code snippets are carefully programmed to go undetected, and their main goal is to steal part of the “muscles” from your PC computing to produce spam, spyware, and so forth. Not only due to the viruses, the slowing performance of your notebook system could also be due to software that has been installed which apparently takes a lot of CPU cycles.

Randomly connected to different websites

Another signs of your notebook infected by virus can be seen when you’re connected to some website randomly. This could be because you are using pirated software, download or opening attachments in spam folder, or it could be due to visiting different websites with cookies tracking. Malware creators usually exploit vulnerabilities in web browsers to inject small piece of code that can evolve into a virus.

Norton 360 Version 6.0 Performance Review, Protection Inside and Outside

In addition to fortify your system from the threat of cyber criminal action, protective PC today also need to equip themselves against the threat from inside. Norton 360 tries to take that role.

Protect your system from cyber crime threats, such as malware, spam, and phishing, should already a must for every PC user. As a result, antivirus packages combined with anti-spam, anti-phishing and parental control seemed to have become standard.

However, what about if the defense is successfully penetrated? Malware can damage the system and spammers / phishers may steal personal data. Not to mention if any time your PC is damaged. Therefore, it is important for us to do a backup data periodically. As a result, if worst possible had happened to, at least the data has been saved.

Seeing this need, Symantec issued a security package that serves more than a bulwark against the threat of cyber crime, the Norton 360. Because the application is equipped with facilities for Backup and PC Tuning.

This time, Norton 360 has reached version 6.0. Compared to previous versions, the appearance of Norton 360 version 6.0 looks more clean with white domination. Icons also come more simple menu with four main functions: PC Security (protection system), Identity (personal identity protection), Backup (backup data), and PC Tuneup (maintenance system performance).

For PC Security and Identity function, application is strengthened by Norton Internet Security 2012 with well proven performance. One reason is due to the SONAR 4.0 technology that can detect malicious processes based on general characteristics of various malware profile in cyberspace.

Norton 360 flagship of course also available on its Backup function. we can choose location of backup data, eg hard disk partitions, external storage media, or could also in online using Secure Online Storage owned by Norton. To use this feature, you must have a Norton account.

In storage “cloud” owned Norton, we can store up to 2 GB Data, like the one provided similar services which currently popular, Dropbox. Of course, the duration of the data transfer to the “cloud” is highly dependent at a speed of internet access that we use. During and after the backup process is over, the data secured with Encryption 128/256-AES method.

Meanwhile, PC Tuneup are not very special because it contains several functions already default in Windows, such as Disk Optimization, File & Registry Cleanup, and Startup Manager. However, this facility can facilitate novice user. This is because all applications are located in one place. Users simply click it once to operate.

Indeed, not many significant changes in Norton 360 version 6.0 besides from appearance-side . New feature is inherited from the Norton Internet Security 2012. But, as a complete protection solution PC in & out, Norton 360 still one of the foremost.

Specification

Type Paid ($52 / 3 PC)
Developer Symantec
Site http://us.norton.com/360
Recommended specifications Windows XP/Vista/7

Only Single Option
Symantec only sold Norton 360 version 6.0 with 3 PC license preferred. The price is more economical. However, this policy can become limiting factor for consumers who just want to put it on one PC.

Powered NIS 2012
Security function in Norton 360 strengthened by NIS 2012 that brought two latest feature, namely Norton Management (managing devices fitted with Norton) and Bandwidth Management (critical updates only).
Less Spacious
2 GB of storage space at online Norton feels less relief. If you want to enlarge the capacity, we have to pay the additional fees quite expensive. Moreover, when compared to similar services (eg. Dropbox).

Conclusion

Plus: The interface appears cleaner; strengthened protection NIS 2012, including two new features; installation fast and memory-efficient

Minus: Not many features that are completely new; online storage capacity less relieved only sold in package 3 PC license.

Score Assessment
 - Usage: 4.2
 - Performance: 4.5
 - Feature: 4.2
 - Price: 3.8
 - Total Score: 4.21

Four Types Scam and Spam to Avoid on Facebook

With more than 800 million registered accounts and 400 million user visits each day, Facebook continues to lead the race dominance of social networking with a unique and innovative products and intelligent marketing strategies that lead to user without stopping to press the ‘like’ and post status updates whole day.

Facebook is not only a major media to share ideas and interact with friends, but the place is booming attack for almost every cyber criminals in the world.

By taking advantage and user confidence in their network connection, the virtual world players spread malicious code and send spam messages using social engineering tricks to spread their message to thousands of unsuspecting users.

Here are the four most common scams on Facebook, which was found by Norton:

1. Like/Share Feed

 Types: social engineering
 Results: Users liked link

Like it or share the feed that occurs when a hacker act as a reliable source and ask a user clicks on “like” at page updates, photos, video or status to access special content (usually sensationalist).

When user clicks the “like”, chances are directed to a survey that requires user to fill out some personal information, sign up for a subscription service, or they even post a link a few times on Facebook.

2. ‘Like’ Clickjacking

 Type: Social engineering/fraud
 Results: Users liked link

‘Like’ click-jacking happens when a hacker presents to view a video with a button to ‘play’ simple, but actually there is a frame that is not visible on a page with hidden buttons “like”. When user “like” that page, posting status updates appear on wall another user – led to their friends curious and tempted to visit this page.

3. Tagging

 Type: Spam
 Results: A spam message which displayed

Tagging occurs when users clicked on an ad or image upload and then characterized to series of random people. If setting allowing user to notify when the user is marked, user will receive an email asking to see pictures. People who are tagged and his friends to click that have been marked and routed to spam.

4. Phishing

 Type: Social Engineering
 Results: It can read and control access to user account

Phishing is a fraudulent message that tells the user that they suspended their Facebook accounts, or take the form from a pending friend request. When user clicks on that link, it will lead users to a fake login page for user account information.

Fake login page will recording user ID and password and then use them to gain unrestricted access to a user account, and will allow detailed information to the user’s password for other online activities such as internet banking.

How to Secure Online Transactions? Tips to Securing and Vulnerabilities

Can not be denied, the number of users online transactions each year continues to increase. Harris Interactive survey conducted in February-March 2012 said there were 57 percent of Internet users who manage bank accounts online and make online shopping. Of these, about 31 percent admitted they store data banking on the hard drive.

Therefore not surprising that banking information is very tempting targets for cyber criminals. The target was none other data such as login passwords, code validation and confirmation of transactions that they could use to fake himself as the owner of an electronic account. In addition, e-mail is also often used as one of the simplest ways to get financial information.

E-mail like this usually contains a message that entices the recipient to provide personal information or visit the official website of a particular bank. Another way is to include a link that directs consumers to third party sites that contain malicious programs. The cyber criminals can steal information from infected systems, by means similar with theft information through websites ‘official’ that they make, or make the interception of information typed through a browser. Interception can also be done directly using a keylogger.

One of the trojan that took part in a theft trick this is Trojan-Banker.MSIL.MultiPhishing.gen. This Trojan detected by Kaspersky Lab experts in January 2012 ago. This Trojan is designed to steal credentials major banks in Europe.

So, although this trojan has entered into a victim’s computer, but this trojan will not be activated immediately, but waits until the user is logged into one bank online services. How it works, the trojan will display a window that mimics the bank authorization form that is accessible, while the original windows from bank will be closed by this trojan. This Trojan can be detected by antivirus registered in England.

To protect customers from threats that exist when doing online banking, some banks apply to their own protection. For example, multiple authentication which requires customers to use two passwords. The first and second login to confirm payment or other transaction.

This can be combined with one-time password system that sent the bank to make cell phone customers every single transaction. Another way is to give a token to its customers to generate passwords on request. In addition, for the outside teller transactions, such as online banking, mobile banking, SMS banking and others, banking uses SSL secure connection that reduces risk of Data theft during transmission.

To ensure the security of your banking information – and the system you use – it takes a reliable antivirus solution with a reliable Internet security. This solution should be able to protect your computer from malicious software, network attacks and malware in e-mail traffic using traditional technology and proactive. You also need an antivirus program that can protect you while exploring the virtual world. To overcome the keylogger can intercept data to typed on your keyboard, you can use a virtual keyboard.

Safe Money Kaspersky provides technology designed to protect banks and other financial information during transactions. Some of the protection offered by this solution are:

  • Database address of bank and trusted e-payment system that can be modified by the consumer;
  • Tools to verify the identity of a server;
  • Tools to scan your computer and look for vulnerabilities that affect the security of online banking;
  • Protection of the browser creates an isolated environment for bank sites, payment systems and online stores;
  • Features that protect the Secure Keyboard Data entry with the help of a special drive and mouse-driven virtual keyboard.

Useful Security Tips from The Top IT Experts in World

Learning from mistakes makes you getting smarter. Moreover, if existing errors coming from the professionals expert.

IT professionals can get caught on tricks of cyber criminals. However, from there they can share useful lessons for all computer users. CnwinTech ask some leading IT experts about their experiences while connecting to Internet. Their experience could be valuable lessons for Internet users.

CnwinTech does not expecting get so many honest answers and some very open. Eugene Kaspersky tells how he succeeded in thwart the kidnapping of his son. Figure of open source, Richard Stallman also expressed his personal opinion about some errors in Windows operating system.

Actually, anyone can implement its own principles in securing data. However, the experience of the experts may also be a personal safety guide.

Eugene Kaspersky: Kidnapping

Click to Expand

Click to Expand

April 2011 ago while a married couple retired Russian kidnap his son, 20-year-old Ivan. To free his son, Eugene Kaspersky with police setting up a hoax. Utilizing the local media, Eugene Kaspersky maneuver distracted the kidnappers by informed that he had paid a ransom of three million Euros. Hoax was successful and further police make action to liberate Ivan without injury.

However, these events brings its own lessons to Eugene Kaspersky. The investigation revealed that the perpetrators collecting personal information from social networks and observing daily activities of potential victims. With this information, they planned criminal.

“No one knows exactly the reason they chose Ivan as a victim,” said Eugene Kaspersky in a special interview with CnwinTech. “However, I suspect because Ivan publish too much personal information on Vkontakte (Russian Facebook),” he added. With that information, kidnappers can easily find out detailed activities of Ivan, watching, and calculate the level of personal security.

With the case, Eugene Kaspersky today still feel guilty since he did not explain the dangers of using social networking and do not give advice to restrict the publication of personal data. “Do not make the same mistake. Act immediately to protect your children”, he warned. 

Thorsten Holz: Hackers who hacked

Click to Expand

Click to Expand

Cyber criminals can also be trapped. When Thorsten Holz see better control server of a network bot for research purposes, he did not believe he was seeing. Bot network administrator does not change the default password server. Thus, the researchers were able to copy and analyze the huge numbers digital loot.

“With the verification of two factors, the network must be more secure (from us)”, says Thorsten Holz. In addition to the password, the user must enter a TAN which will be received on mobile phones via SMS or TAN-apps. Login is just using your username and password hacker easier. With a trojan keylogger, hackers can read any password easily. Currently, Google and Facebook have provided two-factor login.

Mikko Hypponen: Account hijacked

Click to Expand

Click to Expand

Finnish men began a career as a creator of virus. When teenager, Mikko Hypponen make Omega virus which he said is not dangerous. However, he quickly turned toward becoming a major virus hunters at F-Secure and consultants of international security institutions.

Since the 90’s, cyber crime is a billion-dollar business and virus makers likes to targeting community. From there, Mikko Hypponen draw lessons, a program whose name is not familiar (not known) rarely get into the target criminals. “Use another program,” Mikko Hypponen advice. There are many alternatives, like Linux replacement for Windows 7, Foxit Reader replacement Acrobat Reader, or IE replacement Opera.

Bruce Schneier: Brain-Backup

Click to Expand

Click to Expand

Bruce Schneier store data in two brains. Laptop containing e-mails, contacts, and agenda, it’s easy to hijacked. “Backup in my brain,” joked Bruce Schneier. However, this is true because if your life a lot going on computer, data leakage will be more easily happen. With distributed backups across multiple storage media, data security will be more preserved. “Always make backups!” Bruce Schneier said.

Konstantin von Notz: Encrypting e-mail

Click to Expand

Click to Expand

Konstantin von Notz, one of the Green party politicians in the state of Schleswig, Holstein, Germany, fighting for security e-mail as connection between the community and board members via e-mail that encrypted and providing a free application to open it. E-mail encryption is always discussed within the community. Communication without encryption is not compatible with data protection. E-mail without encryption can be read by anyone in the network.

Jacqueline Beauchere: Choose your friends

Click to Expand

Click to Expand

Children are a favorite target of ID thieves. Jacqueline Beauchere, Microsoft security experts found several cases of ID theft on behalf of children who can make many losses. With a social insurance number, criminals get credit for shopping. Losses borne by parents of course.

Therefore, Jacqueline advises young parents to make online security an family theme. You have to explain certain restrictions, including checking list of Facebook friends on a regular basis. This must be done because the case has been common, the best friend today could be the main enemy in the next day.

Digital clean-up on a regular basis can prevent cyber-mobbing. “The end of school year or when changing schools is a good time to do it,” said Jacqueline. “Check your list of friends on social networks with your child and remove any of some can be dangerous,” she said.

Brian Krebs: Unfriendly Resources

Click to Expand

Click to Expand

Brian Krebs has learned from bad experiences. “Internet is good, but with good control as well”, said Brian. Several years ago a hacker wrote to him: “Hi Brian, look at this link”. He not only saw, but clicking on it. After that, the operating system is destroyed. For hours he tried to make computer work again.

Since then, this security experts separate work environment from external communication. “You never know who sent people through Internet, even by friends though. They can send malware”. Now, Brian Krebs much more cautious. “I only install programs that I know and I really want,” added Brian.

Joanna Rutkowska: Secure System

Click to Expand

Click to Expand

Overcoming the problem at its root is the principle of Joanna Rutkowska. For her, a computer security should start from hardware. “During this operating system uses too few hardware technologies that can further improve computer security,” she said.

This Polish security researcher has argued like that because with their team Invisible Things Lab, she has been working on open-source operating system QubesOS extremely secure. Therefore, Joanna Rutkowska does not offer a general security solutions are sold, but with the right answer to the question. For example, how to surfing every day in cyberspace safely?

Thus, you should try to own and use a variety of tools for different tasks. “I use the iPad for surfing and computers backed up to work,” says Joanna. However, it is no longer required when using QubesOS. “Maybe a few more years I can tell you, for those who want a secure computer, you only need to use QubesOS” added Joanna little promotion.

Richard Stallman: Windows spy

Click to Expand

Click to Expand

He is a tireless fighter for freeware applications. Not only that, he did not consider himself to security experts, but he relentlessly warn people about the dangers of computer. “For me the best example is Windows because it has monitoring functions, digital cuffs for user files, and security holes,” said Stallman warned. Therefore, he recommends using freeware software which no longer free to spy on users.

Stephen Pao: Dealing with errant staff

Click to Expand

Click to Expand

Each time Stephen Pao hiring a new employee, co-founder of Barracuda Networks WLAN is always keep an eye in the company. If these new employees brave to log on Facebook without HTTPS protection, hacker software Firesheep Pao’s will turn on alarm.

Furthermore, this network expert can log into a Facebook profile corresponding to view and modify various data at will. Pao just leave funny notes and warns employee with a special note that said “You already know, you work in an IT security companies? Use HTTPS!”

Without HTTPS, usually Data sent without any encryption between website and PC. In an open WLAN, it is an invitation for hackers. On Facebook, its setting option at “Account Settings | Securit | Secure Browsing“. If you have not already, please do. The same function is also offered many other web services.

Candid Wuest: innocent Flash disk

Click to Expand

Click to Expand

Due to already believed to their friends, without thinking Candid Wuest meets the friend request. However, Candid surprised by things he found in his friend flash disk? A vicious USB autorun worm that exist in flash disk. Ultimately, the worm can be active when the flash disk is inserted in a USB slot. Furthermore, the Worm can directly infect the test system’s Candid Wuest.

“I have to reinstall all the computers,” he said. An error due to lack of caution which is not easy to avoid this Symantec experts. Because not all programs recognize the security of any virus, online scan actually can help it. Virustotal.com web service instance can check files with assistance of more than 40 different virus scanner applications.

Sebastian Schreiber: outdated code

Click to Expand

Click to Expand

As request of company, Sebastian Schreiber had infiltrated into network as testers. However, he even panic when installing an application, but he forget the code. By doing a simple trick, still he did not succeed. Currently, simple tips and tricks are actually outdated. To protect your computer, you must take care with difficulty, making it vulnerable to dangers, and should be careful on Internet. Tips from Sebastian, if an expert promise a simple solution, always be skeptical because the experts themselves are not free from error.

Duqu Trojan Use an Unknown Programming Language

Some time later, Duqu Trojan increasingly popular as a dangerous malware targeting intelligence. Duqu was first discovered in September 2011. However, according to Kaspersky Lab, the Duqu trace have been tracked since August 2007. Kaspersky Lab found that Duqu Trojan written in a programming language that is not known. Duqu a sophisticated Trojan that was created by the same people who make Stuxnet. This malware has goal as a system backdoor and facilitate the stealing confidential data.

Kaspersky recorded the biggest victims in Iran. Duqu generally looking for information about production management systems in various industrial sectors, as well as information about trade relations between the several companies in Iran.

The unsolved biggest mystery of Trojan Duqu is how the program communicates with the server Command and Control (C&C) when successfully infect a victim. Duqu module whose role is to interact with the C&C is part of the payload DLL Duqu. After a comprehensive analysis of payload DLL, Kaspersky Lab researchers found there was a special section in payload DLL, specifically communicating with C&C, written in a programming language that is not known. Kaspersky Lab researchers call this unknown part as “Duqu Framework”.

Unlike other Duqu, Duqu Framework is written in C++ and compiled with Visual C++ 2008 Microsoft. Author Possible uses in-house framework to generate intermediary C code, or use a programming language that is completely different. However, the researcher Kaspersky Lab has stated that the language is object-oriented and conducted a number of activities in accordance with the application network.

Duqu Framework Language very special and Payload DLL allows to operate independently with other Duqu module and connect it to the C&C through several channels such as Windows HTTP, network sockets and proxy server. It also allows Payload DLL process the request HTTP server directly from the C&C, secretly move the duplicate information that was stolen from the infected to the C&C, can even distribute the payload other hazardous into other devices in the network, and creates a form of control and the latent spread infection to other computers.

“Given the scale of Duqu project, possibly who created Duqu framework is its own team that different than group that created the driver and writing system infection that exploited,” said Alexander Gostev, Chief Security Expert Kaspersky Lab. “Given the high level of customization and exclusivity on the programming language was created, it is possible this program was created not only to prevent outsiders know the spying cyber operations and its interaction with the C&C, but also to distinguish it from others internal groups Duqu are responsible for writing other part of this program.”

According to Alexander Gostev, making its own programming language shows how high the ability of developers program working on this project, and demonstrate the ability of financial and human resources are mobilized to ensure the project runs.

Kaspersky Lab invites community of programmers or anyone who recognizes the framework, toolkit or unknown programming language Duqu Trojan to contact stopduqu@kaspersky.com.

DNSChanger Trojan make Internet Shutdown on March 8

The Internet could go dark for millions of users as early as March 8 because of a virus that has corrupted computers in more than 100 countries. Last year, authorities in Estonia apprehended six men believed responsible for creating a malicious computer script called the DNSChanger Trojan. Once set loose on the Web, the worm corrupted computers in upwards of 100 countries, including an estimated 500,000 in America alone.

The primary impact of this infection is that it caused web surfers to be sent to fraudulent websites by changing what is called the DNS settings on compromised computers.The Domain Name System (DNS) is the backbone of the Internet’s address scheme and DNS servers are special computers around the world that act as Internet traffic cops providing directions to websites that you wish to visit.

Though the FBI has shut down the DNSChanger network and put up surrogate servers, they warned the solution was only temporary – and the court-ordered deadline is March 8. When the FBI pinched this group, if they had shut down the rogue DNS servers, everyone that was infected would have instantly been cut off from the Internet so the FBI chose a different strategy.They decided to get a court order allowing them to replace the rogue DNS servers with legitimate stand-ins so that all the infected computers wouldn’t get cut off without warning giving them time to get the word out.

Both Windows and MacOS users are at risk for this infection because it exploits your browser, not your operating system. If you are somewhat technical, you can do a self-check of your computer to make sure you’re not infected by comparing your computer’s DNS setting to the list of rogue DNS servers:

 85.255.112.0 through 85.255.127.255
 67.210.0.0 through 67.210.15.255
 93.188.160.0 through 93.188.167.255
 77.67.83.0 through 77.67.83.255
 213.109.64.0 through 213.109.79.255
 64.28.176.0 through 64.28.191.25

The FBI has published a pretty decent guide to performing the self-check here. If you are infected by the DNSChanger Trojan, the FBI reminds us that this malware also disables security updates which could have further exposed you to other malware.

Banker Trojan targeting Online Banking Customer Data

Be careful and always be vigilant when using Online Banking service. Because according to the Kaspersky Security Network in last 3 months, banker Trojans detected in about 2,000 computers per day targeting customer data.

Kaspersky Security Network Data says that there are 780 marks a new malicious programs, which targeting sensitive financial information, get into Kaspersky Lab database. This is equal to 1.1% of total malware detected by Kaspersky software.

In January, Kaspersky Lab experts have found Trojan.Banker.MSIL.MultiPhishing.gen designed to steal data such as bank details of customers a variety of bank like Santander, HSBC Bank UK, Metro Bank, Bank of Scotland, Lloyds TSB and Barclays.

Once inside computer, the Trojan will wait for online banking services to start working. This malware will then bring a copy of display format of the bank authorization. To ensure data, Trojan would do checking data entered. In this way the actors managed to obtain confidential information that gives them full access to customer bank accounts.

This Trojan is mainly targeting customers in the UK, with more than 90% antivirus detection. Not only England, banker Trojans is also targeting online banking users around the world. The most frequent targets of this malware are in Brazil (16.9%), followed by Russia (15.8%) and China (10.8%).

Kaspersky Lab warned computer users to be more careful to keep the information secret, and more careful attention to an online format that asks unusual data.

Simple, Smart and Strong from Avira 2012

In early October ago, Avira has announced the presence of Avira 2012 that carries focus on protecting security of home users, small business and enterprise. Major changes occurred in this 2012 version, especially the increase of user interface, installation process, and level of automation in detecting and virus/malware removal, as it also increases the performance of system resources as well as new virus/malware detection that not yet known.

Simple

With more attractive user interface, intuitive, modern and more efficient design, the installation process simply by double-click and have automatically conflict resolution software during the installation process. The new feature is useful for one-click “Fix Problem” which serves to solve problems that might compromise a user’s computer.

Smart

The new code is designed much more improved for detection of out-witting malware, which this malware deliberately hide itself from antivirus software. This new detection mechanism will find the code that is hiding inside the operating system.

Strong

Detection rate more increase, in which all components have been fortified so that stronger in holding malware attacks that specifically target antivirus software itself. Avira has defensive capability without locking the registry, better resistance against process termination and removal of components, from malware that make new steps in return.

Avira 2012 can be downloaded via the official website at www.avira.com and for business customers avira products can upgrade through centralized Security Management Center which will be available starting 17 October.