K7 Computing released the latest build for K7 antivirus home edition products with enhanced features and support for the latest Windows 8.1 operating system.
1. Microsoft Windows 8.1 upgrade support added
2. Parental Control/Web filtering support added for Internet Explorer 11 and the latest Google Chrome versions
3. New Scan Engine included as a part of regular speed performance and detection quality enhancements
4. Safe search support added for Internet Explorer 10 and Internet Explorer 11
New build version of K7 Ultimate Security, K7 Total Security and K7 Antivirus plus version 13.1.0205 onwards is delivered to K7 users via regular update.
For a free 30 day trial visit:
United Kingdom: http://www.k7computing.co.uk/free_trial_download.php
K7 Total Security 13.1 product has earned the latest VB100 award for the Windows XP SP3 platform.
Latest K7 Total Security in a version 13.1 reached higher positioning among the previous testing results.
The test result shows that:
- K7 have made big improvements in proactive and reactive detection rates for antivirus protection.
- The Virus Bulletin organisation has praised the new look and feel of K7 Total Security.
- K7 Total Security is rated as ‘Solid’ which is the best rating for product stability.
Full test results: https://www.virusbtn.com/vb100/archive/test?recent=1
A few months back we had blogged about how the FBI had extended the deadline for turning off the rogue DNS servers it had taken control of. Lo and behold! that dead line has finally arrived.
Given the amount of grace period that was provided before putting these servers down, one would assume that the infected PCs would have been cleaned up by now. However, according to the DNS Changer Working Group, a worrying number of PCs still have their DNS entries pointing to the malicious servers.
Our customers need not worry though, for K7 products already have the functionality to diagnose these rogue DNS IP addresses, and replace them with known good ones.
K7 Computing is happy to announce that we are exhibiting at Info Security 2012 in London. The biggest European Information Security venue. Show is starting 24th of April 2012 and finishes 26th of April. Earls Court, London.
We would like to welcome everybody to our stand B60.
We are presenting our latest Security Software, integration and solutions for the end-users, SMB and Enterprise clients.
Retail products and Public Sector offerings will be presented by our technicians in a live presentations and any queries can be answered immediately by a members of our team.
If you get a chance, we will be delighted to welcome you at our stand B60
K7 Computing Team
In tales of yore, circa 2007, DNSChanger malware, which modify certain network settings to point to a rogue server, were as prevalent as the Stegosaurus. Fast forward almost four years, to the present day, their legacy still remains. They say the FBI, having discovered the rogue DNS servers, decided to clean them up and allow them to serve the public good. That is, only until the 8th of March, 2012.
According to much hyped reports in recent weeks, the 8th of March was to be the day the internet died, as the FBI would have been forced to lay to rest those servants of the public weal. If you are still reading this post then your computer didn’t fall victim to the supposed blackout. There are at least two possible reasons for this:
- The FBI has an extension on the deadline. Apparently the dreaded Death Of Internet Day (DOID) has been postponed to the 9th of July, 2012
- Lo and behold, you are not infected with DNSChanger malware and never have been
If you have been a K7 customer for a while, point 2 applies to you. Just to be on the safe side, K7 Security products sniffs for the erstwhile rogue DNS entries and snuffs them out if found, thereby ensuring that our brand new customers too are free from DOID.
Samir Mody/Lokesh Kumar
One of the items on a malware authors checklist while distributing malicious code is to make sure that their malware (virus, trojan, backdoor, keylogger, phishing tool, etc.) remains undetected, for as long as possible. Scanning their creation using a multiple Anti-Virus scanning system is one among the many techniques in their arsenal which ensures just that.
Although time consuming and resource intensive, the malware author installs various Anti-Virus software and keeps them updated. The malicious files are scanned on this system before they are distributed to the victim.
For malware authors/script kiddies who can’t afford to build such a system, there are underground sites which mimic genuine online file/URL scanning services. A significant difference being, these underground sites in exchange for money, promise not to distribute the scanned files to the Anti-Virus vendors. Given below are screen shots of two such sites:
Then there are tools which incorporate multiple scanners & are distributed for free. For example one such a tool for multiple AV engines scanning:
If their malicious code is detected by the Anti-Virus vendors during the initial stage of the attack, the malware authors reacts quickly and change their binary.
While traditional checksum MD5 based detections alone might be ineffective against such files, a combination of several detection methods, which include a behavior based approach will prove far more effective.
R.V Shyam Charan