Spyware, Viruses, & Security forum

Alert

NEWS - January 07, 2014

Intel ditches McAfee brand: 'THANK GOD' shouts McAfee the man

CES2014 Intel has announced plans to phase out the infamous McAfee anti-virus brand over the next year in favour of a new Intel Security brand.

The re-branding will begin immediately, but the transition will take up to a year before it is complete with the introduction of new versions of security software products from the technology giant. The shield - which represents the core values of security and protection - will remain and McAfee will continue to operate as a wholly owned subsidiary of Intel, albeit under the Intel Security umbrella.

Brian Krzanich, chief exec of Intel, announced the branding change during a presentation at CES 2014, the consumer technology conference taking place in Las Vegas this week.

Continued: http://www.theregister.co.uk/2014/01/07/intel_ditches_mcafee_brand/

Related:
Intel announces death of McAfee brand. Will it be that simple?
Intel to Replace McAfee Brand with "Intel Security"
'Dinosaur' Intel Kills McAfee Name
Discussion is locked
You are posting a reply to: NEWS - January 07, 2014
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - January 07, 2014
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Backdoor in wireless DSL routers lets attacker reset router,

In reply to: NEWS - January 07, 2014

.. get admin

"A quick Christmas hack uncovers a vulnerability in Linksys, Netgear, others."

A hacker has found a backdoor to wireless combination router/DSL modems that could allow an attacker to reset the router's configuration and gain access to the administrative control panel. The attack, confirmed to work on several Linksys and Netgear DSL modems, exploits an open port accessible over the wireless local network.

The backdoor requires that the attacker be on the local network, so this isn't something that could be used to remotely attack DSL users. However, it could be used to commandeer a wireless access point and allow an attacker to get unfettered access to local network resources. Update: Vanderbeken reports some routers have the backdoor open to the Internet side as well, leaving them vulnerable to remote attack.

Continued : http://arstechnica.com/security/2014/01/backdoor-in-wireless-dsl-routers-lets-attacker-reset-router-get-admin/

Related :
Hacker backdoors Linksys, Netgear, Cisco and other routers
Critical backdoor in Linksys and Netgear routers found
Collapse -
World of Warcraft users hit by account-hijacking malware

In reply to: NEWS - January 07, 2014

.. attack

"Infection spread by trojanized add-on, able to defeat two-factor authentication."

World of Warcraft players have been hit with a malicious trojan that hijacks accounts even when they're protected by two-factor authentication, officials have warned.

The malware is infecting systems by posing as an installer of Curse, a legitimate add-on that helps players manage other World of Warcraft add-ons. On Friday, officials with WoW developer Blizzard warned that trojanized versions of Curse available on unofficial sites were posing as the authorized Curse client. Once installed on end-user computers, the imposter versions were being used to take over accounts. In some cases, users reported that their accounts were hijacked even after the passwords were changed and even when the accounts were protected by Authenticator, a two-factor authentication system that sends a temporary password to players' smartphones.

"We've been receiving reports regarding a dangerous trojan that is being used to compromise players' accounts even if they are using an authenticator for protection," Blizzard officials wrote on Friday. "The trojan acts in real time to do this by stealing both your account information and the authenticator password at the time you enter them."

Continued : http://arstechnica.com/security/2014/01/world-of-warcraft-users-hit-by-account-hijacking-malware-attack/

Related:
WoW gamers targeted with trojanized Curse client
Trojan program hijacks World of Warcraft accounts despite two-factor authentication
Collapse -
The End of Microsoft's Support for Windows XP

In reply to: NEWS - January 07, 2014

Kaspersky Lab Weblog:

This will take place on April 8, 2014 and Microsoft has already announced this publicly. This would not be a problem if all Windows users would have already migrated to more recent versions of Windows or do so by the mentioned date. However, according to our statistics based on the KSN technology during the last 30 days, 18% of Windows users worldwide still use the XP platform. [Screenshot]

What is the problem exactly? Well, initially, with the discontinuation of support for Windows XP, Microsoft will no longer work on updates / patches for the vulnerabilities that appear after the mentioned date. These vulnerabilities will undoubtedly be used by attackers through the creation of exploits to compromise machines. In other words, any Windows XP vulnerability found after April 8th, 2014, will prove effective for cybercriminals and will simply not have an official patch for the operating system.

Secondly, once Microsoft's support for Windows XP ends, other software providers will also stop supporting it in their own products and what will then happen is that users will not only be left with a vulnerable operating system but with third party applications that are also vulnerable, thus multiplying the possibility of infection that will allow cybercriminals to access the confidential information of their victims. In reality, this is a chain reaction that cannot be repaired unless users migrate to a newer version of Microsoft Windows.

Continued : http://www.securelist.com/en/blog/208214211/The_End_of_Microsofts_Support_for_Windows_XP

Collapse -
Using Psychology To Create A Better Malware Warning

In reply to: NEWS - January 07, 2014

It turns out the best way to get people to pay attention to those malware warnings that pop up in browsers may be to stop tweaking them, scrap them entirely and rebuild from scratch. According to a study on the subject published last week, efficient malware warnings shouldn't scare users away, they should give a clear and concise idea of what is happening and how much risk users are exposing themselves to.

It's already well documented that the average computer user largely ignores the warnings, but new research is trying to determine just how browser architects and information technology specialists can create more effective warnings going forward.

Ross Anderson, the Head of Cryptography at Cambridge University and David Modic, a research associate at the school's Computer Laboratory used psychology last year to find their answer. The duo's research, a 31-page document "Reading This May Harm Your Computer: The Psychology of Malware Warnings," was released Friday.

Continued : http://threatpost.com/using-psychology-to-create-a-better-malware-warning/103459

Collapse -
Malicious Ads on DailyMotion Redirect to Fake AV Attack

In reply to: NEWS - January 07, 2014

Video-sharing site DailyMotion, one of the most popular destinations on the Web, is in the throes of an attack where it is serving malicious ads redirecting users to a fake AV scam.

Security firm Invincea reported the issue to the website, and as of 4 p.m. ET, DailyMotion was still serving the fake AV malware.

This is the second malvertising attack reported this week. Earlier, Yahoo sites in Europe were serving ads that dropped an iframe sending users to domains hosting the Magnitude exploit kit, which then seeded victims with a host of financial malware.

DailyMotion attracts 17 million monthly visitors and is the 95th-ranked website according to Alexa.

Invincea said that the malicious ads redirect to a third-party domain in Poland called webantivirusprorh[.]pl (93[.]115[.]82[.[246). According to VirusTotal, 10 of 47 antivirus products detect the threat; most detect it as a variant of the Graftor Trojan. The initial redirect, Invincea said, is loaded via engine[.]adzerk[.]net.

Continued : http://threatpost.com/malicious-ads-on-dailymotion-redirect-to-fake-av-attack/103494

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

SMART HOME

This one tip will help you sleep better tonight

A few seconds are all you need to get a better night's rest.