Tag Archive | software

February New K7 antivirus products build release

 

New K7 Enterprise Security build 2.5.0.35

K7 Computing is happy to announce new build for its endpoint security product.

K7 Enterprise Security

Main new software improvements includes:

  • Improved Rip and Replace feature for installation over previous security software product.
  • Filter option introduced (with the status of Pending / Dispatched/ Completed)under Task Details to know the task completion on each endpoint.
  • Task status of a client can be viewed by selecting the relevant computer under Clients list.
  • “All Groups” option has been introduced under Group selection UI when you create any new Task. Easily allowing to replicate it to the whole network.

K7 Enterprise Security screenshot 1

K7 Enterprise Security current installations will receive these updates within upcoming days automatically.

Trial licences for your sites and new customers are available by request. Please contact sales@k7computing.co.uk


New K7 Home antivirus security products 14.2.0.249

K7 Computing has released improved versions of its home / small office security products:
K7 Antivirus, K7 Total Security and K7 Ultimate Security
K7 Home security antivirus products
Some of the newly updated features:

Permanent Data Deletion

  • Erase sensitive data permanently, which you don’t want others to discover.

Secure Transaction

  • Online monetary transactions protection with anti-screen capture and anti-key logging function.

USB Protection

  • Auto scans USB media for concealed threats and vaccinates USB devices from getting infected.

All versions are available for 30 days free trial at: K7 UK Website or K7 Ireland Website.

Current installations are updated automatically with regular updates.

K7 Supports Windows 8.1

K7 Computing released the latest build for K7 antivirus home edition products with enhanced features and support for the latest Windows 8.1 operating system.

Release Notes:

1. Microsoft Windows 8.1 upgrade support added

2. Parental Control/Web filtering support added for Internet Explorer 11 and the latest Google Chrome versions

3. New Scan Engine included as a part of regular speed performance and detection quality enhancements

4. Safe search support added for Internet Explorer 10 and Internet Explorer 11

 

New build version of K7 Ultimate Security, K7 Total Security and K7 Antivirus plus version 13.1.0205 onwards is delivered to K7 users via regular update.

For a free 30 day trial visit:

United Kingdom: http://www.k7computing.co.uk/free_trial_download.php

Ireland: http://www.k7computing.ie/free_trial_download.php

K7 Computing Releases a New Version 13.1 of the K7 Antivirus and Security Product Line

K7 Computing antivirus and security products have been updated to version 13.1

This new version brings improvements to the installation and security modules, especially new firewall and improved antivirus engine performance.

In the newest build 13.1 K7 has updated Firewall module and antivirus engine performance. Speeding up even still unbeatable installation time averaging in less than a minute. On a new PC/Laptop can be achieved in less than 25 seconds.

The scanning speed of the antivirus engine is the most-kept secret in K7, which makes your computer run faster than before. The program’s performance speed does not slow down processes and, therefore, you won’t notice any slowdown of your computer. Unobtrusive but complete PC protection is the key factor for K7 security products.

Latest 13.1 versions of K7 Antivirus Products:

  • K7 Antivirus Plus
  • K7 Total Security
  • K7 Ultimate Security

K7 Ultimate Security
Every installation of K7 is automatically upgraded to the latest release, with new features and modules, therefore K7 customers don’t have to worried about an old version being installed on their PC.

K7 Computing takes a different approach at the software version names and as of Q3 of 2012, is not using any prefix for the software version. Builds that reflect new features and improvements are identified as the year they are released and the update version, E.g.,  12.2, 13.0 and newest version is 13.1

For more information, including a free 30 day trial, please visit:

K7  Computing UK site: http://www.k7computing.co.uk/download.php

K7 Computing Irish website: http://www.k7computing.ie/download.php

 

Additional links:

Twitter: https://twitter.com/K7ComputingUK

Google+: https://plus.google.com/111225020590246781521/posts

Facebook: https://www.facebook.com/k7computing.co.uk

K7 is Windows 8 Compatible

K7 Computing is happy to announce that it’s latest build released today 30th October 2012 is fully compatible with newest Microsoft Windows 8 operating system.

Windows 8

K7 is working hard on assuring full compatibility with Windows 8 for the last year and the latest build assures smooth and unbeatable performance of K7 protection.

Latest K7 antivirus products are following in the footsteps of previous versions with unmatched great performance and lowest system resources impact.

Latest 12.2 build changelog:

  • Windows 8 Compatible
  • Enhanced Firewall with IPv6 network support
  • Improved Scan Engine for better Scan speed and performance
  • Enhanced Application Control to support 64 bit network applications
  • Improved third party products detection and removal

New product builds have one new extra great ability and that’s installation time. K7 antivirus protections are capable of installing on the new system in less than 30 seconds. Protecting your system, your data and your privacy with the lightning speed of K7 antivirus engine.

K7 Total Security compatibility page

K7 Ultimate Security compatibility page

Latest software version of K7 Antivirus Plus, K7 Total Security and K7 Ultimate Security can be downloaded at: www.k7computing.ie or www.k7computing.co.uk

Carnivore Has a 0-Tolerance Policy, IE is protected by K7

The current unpatched Microsoft Internet Explorer (6, 7, 8, 9) vulnerability was being actively exploited in the wild even before it was assigned a CVE. 0-day indeed. Microsoft is due to release an Out-Of-Band patch for this exploit shortly, but unfortunately some damage has already been done via targeted attacks currently emanating from China. All of this follows in the wake of the Java vulnerability written about recently.

As MAPP partners we were privy to extra information from Microsoft about how to go about detecting attempts to exploit the vulnerability. However it turns out that the Carnivore technology embedded in K7 security products already blocked any attempt to exploit this vulnerability, as it did in the Java vulnerability case a few weeks back.

Here is an attempt to exploit the currently unpatched Use-After-Free Internet Explorer vulnerability:

 Carnivore

K7 Ultimate security result

 

No patches were required, no HTML/JavaScript heuristic detection, no nothing. Note, that is not to say that you do not need to install patches. Please install the patches, especially OS-related ones, as soon as possible.

Targeted attacks are becoming more and more prevalent, and a common feature of these is the use of exploits, some of them ’0-day’, to deliver the malicious payloads. Carnivore provides an early warning and blocking safety mechanism whether the modus operandi involves a browser, a document, or something else in the future. Carnivore may not be perfect, but it certainly is a powerful maintainer of border security.

Samir Mody
Senior Manager, K7TCL

for free K7 antivirus trial visit:

www.k7computing.co.uk | www.k7computing.ie

Z-Rated

Zero-Access is one of the more prevalent and sophisticated pieces of malware observed in recent times. Similar to other malware in its class, it is able to infect both 32-bit and 64-bit Windows operating systems with kernel mode root-kit components.
Recently it has become apparent that Zero-Access evolved, some would call it ‘regressed’, from a kernel mode root-kit into a user mode patcher. Closer inspection reveals that this latest version infects Microsoft’s Service Control Manager (services.exe) on 64-bit systems. Strangely, the original host bytes don’t appear to be stored in the patched executable, making disinfection non-trivial. Given the importance of the OS application affected, it is advisable to replace the infected binary with an exact copy of the original file. Please note that restoration of the file is best left to the experts.

Distribution methods for Zero-Access include both social engineering tactics & drive-by-downloads. It pretends to be software updates using file names like [Removed]_update_for_Win.exe or pornographic material using file names like animal_[Removed].avi.exe, to lure its potential victims.

K7 security products not only prevents access to the malicious URLs involved in spreading this malware, but also pro-actively detects components of this malware in real time.

Lokesh Kumar/Samir Mody
K7 TCL

Drop By @ AppData’s – Open Round the Clock

Malware authors work round the clock to serve up mouth-watering malware to an unsuspecting victim.

What we have on today’s menu is a small but effective tweak that malware authors incorporated into their “software” that makes %AppData% the prime real estate on your system’s hard drive for malware and their families.

The Application Data area of the current user, to be more specific. This is one location on your hard drive that stands exposed to multiple hits of various malware families.Hard drive

For starters let’s look at where this folder is found on your machine. In WinXP it’s at <root>\Documents and settings\%Current_User%\Application Data and<root>\Documents and settings\%Current_User%\Local Settings\Application Data. For Vista and Windows 7 it’s at<root>\Users\<username>\AppData\Roaming and <root>\Users\<username>\AppData\Local. (Please feel free to do a quick check in these areas on your computer to find out if you have something suspicious lurking…)

It wasn’t always this way. It was only recently that most of the file-copy actions moved from the Windows, System32, and Program Files directories to the %AppData% directory.

So, “Why move away from the system areas?”, you might ask. Well, that’s the main course. The basic answer could well be that relatively recent flavours of Windows, i.e. Vista and Windows 7, with their more strengthen security measures, have succeeded to a certain level, in forcing malware authors out of the system areas to the %AppData% areas.

System areas are now protected and require Administrator privileges to effect a modification.  So why worry about putting in extra code when it’s not needed, the malware authors might have thought. Malware families with a legacy, like ZBot, have moved out of the system directories. Yes, gone are the days of %System%\SDRA64.EXE%System%\NTOS.EXE etc. It’s now just random folders and random filenames in the AppData path. Rogue AVs that ‘Installed’ under proper program directories, viz. %Program Files%\Antivirus 2008\Antvrs.exe, have now become ‘xyz123.exe’s in %AppData%.

And, finally, for dessert. We would only say that the system directories haven’t been deserted entirely but have just been relegated to second choice. AppData is the new “system area” for malware authors. Note, under Windows XP you don’t require administrator privileges to copy any file into a system area and masquerade as a system file.

Kaarthik
K7TCL

K7 Computing UK | K7 Computing IRL