Spyware Warrior reports about new rogue anti spyware – The Spyware Shield The Spyware Shield uses inadequate detection scheme. This app as Ad-Purge Spyware Remover, Privacy Crusader, & Spy Reaper Downloadable from thespywareshield.com
Myantispyware team No Comment Rogue Anti Spyware
Spyware Warrior reports about new rogue anti spyware – The Spyware Shield The Spyware Shield uses inadequate detection scheme. This app as Ad-Purge Spyware Remover, Privacy Crusader, & Spy Reaper Downloadable from thespywareshield.com
Myantispyware team No Comment Virus
A new variant of W32/Feebs is making the rounds. Fellow handler Bojan has spent quite some time with de-obfuscating the JavaScript and VB code, and we’re still looking at what it does besides downloading base64 encoded versions of W32/Feebs. You might want to block access to *.coconia.net *.by.ru *.kazan.bz *.t35.com *.freecoolsite.com *.nm.ru until the AV
Myantispyware team No Comment Exploits & Vulnerabilities
Multiple vulnerabilities have been identified in Winamp, which could be exploited by remote attackers to take complete control of the affected system. The first flaw is due to a buffer overflow error when processing a specially crafted playlist containing an overly long media filename, which could be exploited by remote attackers to compromise a vulnerable
Myantispyware team No Comment Worms
Leap.A is a binary file compiled for Mac OS X. It arrives in an archive file, called ‘latestpics.tgz’. When the executable in the archive is opened the virus activates. First it drops an icon resource and an external hook bundle which is used for spreading through iChat. Spreading through iChat Leap.A installs a bundle to
Myantispyware team No Comment Tips
Heise Online is reporting about yet another example of the ever-warming relationship of copy protection and rootkit technologies. The affair started with the digital rights management system Sony BMG was using to protect audio CD’s. Now, F-Secure can also confirm that at least the German DVD release of the movie “Mr. & Mrs. Smith” contains
Myantispyware team No Comment Exploits & Vulnerabilities
The exploit craft a malicious BMP file to perform buffer overflow in Media Player. Keeping in mind as Microsoft has pointed out that the exploiting factor can include other graphics file as well (such as .wmp), it’s a good idea to get it patched ASAP. Read more about Vulnerability and how to patch here.
Myantispyware team No Comment Updates
New definitions: ==================== Malware.Azesearch The Spy Guard Win32.Trojan.Downloader +53 Win32.Trojan.Keylogger Updated definitions: ==================== Adware.CasinoClient Adware.DollarRevenue +75 Adware.FreeProd Toolbar BargainBuddy IstBar Lop +15 SpywareNo SurfSideKickBHO Win32.Backdoor.Agent +2 Win32.Trojan.StartPage Win32.TrojanClicker Winfixer VX2 +56 YourSiteBar Read more and download here.
Myantispyware team No Comment Critical patch, Exploits & Vulnerabilities
Windows Media player has a unchecked buffer that will allow for remote code execution if users view or open a specially crafted .bmp file. Keep in mind there are many ways for this to be exploited and .bmp files are not the only way. Microsoft states: “An attacker could also attempt to exploit this vulnerability
Myantispyware team 2 Comments Tutorials - HowTo
AlfaCleaner is a rogue anti spyware program that is known to issue fake warnings on your computer in order to manipulate you into buying its full commercial version. AlfaCleaner is a variant of the Anti Virus Pro, Winhound Spyware Remover, & XSRemover Downloadable from alfacleaner.com, innovagest2000.com You may want to print out or make a
Myantispyware team No Comment Free Software
Hoster is an ultra-groovy Hosts file Manager, Editor and Helper-outter. Below you’ll find a list of Hoster’s functions. Append File – Allows selection of a file to be appended to your current hosts file. Replace File – Allows selection of a file to replace your hosts file. Merge File – Allows selection of a file