Tag Archive | cybercrime

K7 Supports Windows 8.1

K7 Computing released the latest build for K7 antivirus home edition products with enhanced features and support for the latest Windows 8.1 operating system.

Release Notes:

1. Microsoft Windows 8.1 upgrade support added

2. Parental Control/Web filtering support added for Internet Explorer 11 and the latest Google Chrome versions

3. New Scan Engine included as a part of regular speed performance and detection quality enhancements

4. Safe search support added for Internet Explorer 10 and Internet Explorer 11

 

New build version of K7 Ultimate Security, K7 Total Security and K7 Antivirus plus version 13.1.0205 onwards is delivered to K7 users via regular update.

For a free 30 day trial visit:

United Kingdom: http://www.k7computing.co.uk/free_trial_download.php

Ireland: http://www.k7computing.ie/free_trial_download.php

K7 Total Security secured yet another VB-100 award

K7 Total Security 13.1 product has earned the latest VB100 award for the Windows XP SP3 platform.

VB-100 awardWe are pleased to say that we have passed yet another VB-100 award. Constant research and development for K7 antivirus products are gaining on recognition among the professionals and end -users.

Latest K7 Total Security in a version 13.1 reached higher positioning among the previous testing results.

The test result shows that:

  • K7 have made big improvements in proactive and reactive detection rates for antivirus protection.
  • The Virus Bulletin organisation has praised the new look and feel of K7 Total Security.
  • K7 Total Security is rated as ‘Solid’ which is the best rating for product stability.

Full test results: https://www.virusbtn.com/vb100/archive/test?recent=1

From Domain Name Servers to Dead Name Servers

A few months back we had blogged about how the FBI had extended the deadline for turning off the rogue DNS servers it had taken control of. Lo and behold! that dead line has finally arrived.

Given the amount of grace period that was provided before putting these servers down, one would assume that the infected PCs would have been cleaned up by now. However, according to the DNS Changer Working Group, a worrying number of PCs still have their DNS entries pointing to the malicious servers.

Our customers need not worry though, for K7 products already have the functionality to diagnose these rogue DNS IP addresses, and replace them with known good ones.

Lokesh Kumar
K7TCL

InfoSecurity 2012 London – K7 Computing at the stand B60

K7 Computing is  happy to announce that we are exhibiting at Info Security 2012 in London. The biggest European Information Security venue. Show is starting 24th of April 2012 and finishes 26th of April. Earls Court, London.

We would like to welcome everybody to our stand B60.

We are presenting our latest Security Software, integration and solutions for the end-users, SMB and Enterprise clients.

Retail products and Public Sector offerings will be presented by our technicians in a live presentations and any queries can be answered immediately by a members of our team.

If you get a chance, we will be delighted to welcome you at our stand B60

 

K7 Computing Team

These Are Not The DOIDs You Are Looking For

In tales of yore, circa 2007, DNSChanger malware, which modify certain network settings to point to a rogue server, were as prevalent as the Stegosaurus. Fast forward almost four years, to the present day, their legacy still remains. They say the FBI, having discovered the rogue DNS servers, decided to clean them up and allow them to serve the public good. That is, only until the 8th of March, 2012.

According to much hyped reports in recent weeks, the 8th of March was to be the day the internet died, as the FBI would have been forced to lay to rest those servants of the public weal. If you are still reading this post then your computer didn’t fall victim to the supposed blackout. There are at least two possible reasons for this:

  • The FBI has an extension on the deadline. Apparently the dreaded Death Of Internet Day (DOID) has been postponed to the 9th of July, 2012
  • Lo and behold, you are not infected with DNSChanger malware and never have been

If you have been a K7 customer for a while, point 2 applies to you. Just to be on the safe side, K7 Security products sniffs for the erstwhile rogue DNS entries and snuffs them out if found, thereby ensuring that our brand new customers too are free from DOID.

Samir Mody/Lokesh Kumar
K7TCL

K7 Computing UK  | K7 Computing IRL

Phone text – free calls offer?

Phone Text phishing scams are nothing new in the recent years, but they are just not so common, like e-mail scams are. You know those Millions winning offers, bank details request to transfer gadzillions of dolars from some princess in some country, and many others. Funny ones or sometimes even very convincing one.  Recently we have received screenshots from our colleges in Ireland for a phishing scam targeting O2 provider customers via text message.

Message is simple:

O2 phone scam

If you are not many of us – click at what ever shows up on the screen, than you will notice what’s wrong with the message: The link is not to O2 page, which is o2.co.uk or o2.ie but it’s to o2upgrades.org

ORG domain is purposely for organization with non-profit character. So deferentially not O2.

If you click at the link you are redirected to:

O2 Scam messageAnd here is exactly what we expected – phishing page where you enter your Mobile number and password. Therefore exposing your account details.

We have entered fictive details in to the form, and what happens next is that we are redirected after to legitimate O2 website login page:

O2 web

And this is what most user are not aware of. For that split of second you have entered your login details on the page 2 and pressed submit, your records were written to someones database, and than you are passed to the legitimate O2 website. You think, hm… maybe I did enter it wrong. If yo did it right, you have just gave your details to some cyber criminal who can pass your details further, sell it on the black market or even use it himself. You are now on the legitimate O2 website login page, but no sign about the special offer. Why? Because it never existed. That was the whole phishing scam – phishing because  what it means – to lure you somewhere where you would enter your login details so they get recorded for someone, somewhere for some purpose.

Be aware: if something looks as a very good offer, and it’s sent straight to you, stop, and think. In most cases it’s a scam. And if you are not sure, why not to ring the sender to make sure that the message is legitimate?

And in case you fell for the scam, just change your login details immediately.

-sg-

Prepared by K7 Computing UK and K7 Computing Ireland.

Malware Authors and Multiple Scanners

One of the items on a malware authors checklist while distributing malicious code is to make sure that their malware (virus, trojan, backdoor, keylogger, phishing tool, etc.) remains undetected, for as long as possible. Scanning their creation using a multiple Anti-Virus scanning system is one among the many techniques in their arsenal which ensures just that.

Although time consuming and resource intensive, the malware author installs various Anti-Virus software and keeps them updated. The malicious files are scanned on this system before they are distributed to the victim.

For malware authors/script kiddies who can’t afford to build such a system, there are underground sites which mimic genuine online file/URL scanning services. A significant difference being, these underground sites in exchange for money, promise not to distribute the scanned files to the Anti-Virus vendors. Given below are screen shots of two such sites:AV Scanners

AV Web Scanner 2

Then there are tools which incorporate multiple scanners & are distributed for free. For example one such a tool for multiple AV engines scanning:

AV Web Scanner 3

If their malicious code is detected by the Anti-Virus vendors during the initial stage of the attack, the malware authors reacts quickly  and  change their binary.

While traditional checksum MD5 based detections alone might be ineffective against such files, a combination of several detection methods, which include a behavior based approach will prove far more effective.

R.V Shyam Charan
K7 TCL

Published by K7 Computing United Kingdom and K7 Computing Ireland