Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Sep 2009 18:38:07 -0700
From:      "PC Tools" <newsletter@email.pctools.com>
To:        doc@freebsd.org
Subject:   PC Tools September Newsletter
Message-ID:  <4AB82A7F.0000079E@omp.email.pctools.com>

next in thread | raw e-mail | index | archive | help

   <=21DOCTYPE html PUBLIC =22-//W3C//DTD XHTML 1=2E0 Transitional//EN=22
   =22h= ttp://www=2Ew3=2Eorg/TR/xhtml1/DTD/xhtml1-transitional=2Edtd=22>

   Combat new and unknown threats with the right knowled= ge
   (continued)=2E
   If you are unable to see the images, add the domain =40email=2Epc=
   tools=2Ecom to your Safe Sender list or [1]view online
   3D=22=22 3D=22=22                                        3D=22=22

   [2]3D=22=22 
   =3D=22=22 =20

   Improving our "security s= avvy" continued=2E=2E=2E=2E=2E=2E

   In this edition we'll be covering:

   [3]Heuristics= - Psychology 101?

   [4]Blog Safa= ri =E2=80=93 stay in touch with what's happening in the
   wild

   [5]PC Tools a= t 2009 Virus Bulletin Conference

   Heuristics - Psychology 101?

   No, this isn't an introductory Psychology lesson=21 Heuristics is a
   term= used to describe the different types of anti-malware
   technology=2E Anti-M= alware technology comes in two main forms,
   signature and behavioral based = protection=2E

   Signature based protection

   PC Tools use a variety of signature types, the most effective being
   ge= neric or smart Sliding Fit Signatures (SFS)=2E

   Generic signatures can detect numerous malware files with one
   signature= =2E This is achieved through the analysis work of the PC
   Tools research te= am=2E They focus on malware families, looking in
   collected sample files fo= r similar code that malware files in the
   same family have in common=2E Thi= s means PC Tools can effectively
   detect threats known to frequently modify= and so catering for the
   significant number of threat variants in the wild= =2E This technology
   is present in [6]Spyware Doctor&=238482;, [7]Spyware Doctor with
   AntiVirus and [8]PC Tools Internet Security&=238482; and delivers
   bett= er protection against the latest threat outbreaks=2E
   [=] =
   [sec=]   Important Tip: S= chedule regular Smart Updates and keep your
   subscription up-to-date to ens= ure you have the latest signatures to
   identify malware=2E   [sec=]
   [=]

   Behavioral Protection

   Behavioral protection analyzes the processes at the system level of
   yo= ur PC, constantly monitoring for suspicious activity=2E If
   detected the pr= ocess is immediately terminated and quarantined=2E
   [9]ThreatFire&=238482;<= /a> with ActiveDefense Technology is our
   behavioral based protecti= on=2E It's used in [10]Spyware D= octor and
   [11]PC Tools Intern= et Security providing you with proactive
   protection against Zero-Day at= tacks=2E Ideally a combination of
   Signature and Behavioral Protect= ion is your strongest defense
   against cybercrimin= als=2E
   [=] =
   [sec=]   Important Tip: T= he majority of malware enters your PC via
   the internet so effective browse= r protection like PC Tools Browser
   Defender is essential=21   [sec=]
   [=]

   Blog Safari =E2=80=93 stay in to= uch with what's happening in the
   wild

   If you want to pick up interesting ideas, tips and tricks, the latest
   = threat news or just connect with like-minded PC users, here's a list
   of Bl= ogs we regularly update to help you stay in touch with what's
   happening in= the wild:

   ThreatFire blog managed by Kurt Baumgartner
   [12]http://blog=2Ethreatfire=2Ecom/

   ThreatExpert blog managed by Sergei Shevchenko
   [13]http://blog=2Ethreatexpert=2Ecom/

   iAntiVirus blog managed by Erwin Varona
   [14]http://blog=2Eiantivirus=2Ecom/

   PC Tools at 2009 Virus Bulletin = Conference

   The [15]Virus Bulletin 2009, is one of the most informative
   anti-malware annu= al conferences running since 1991, is being held in
   Geneva, Switzerland th= is year=2E Our own Kurt Baumgartner from the
   [16]PC Too= ls ThreatFire research team will be presenting for a third
   year=2E Kur= t will be presenting on the topic "[17]AntiRE En Masse"
   discussing anti reversing techniques= documented in Peter Ferrie's
   recent set of papers published in multiple V= irus Bulletin magazines
   over the past year=2E Kurt will be discussing Wale= dac, Koobface,
   Taterf/Gamepass, and other "crimeware=E2=80=9D nailed = by ThreatFire
   on a daily basis=2E

   P=2ES=2E Don't miss out on your opportunity to test run our 2010
   Securi= ty Product Release by registering to participate in the Beta
   Release=2E Ju= st click on the banner above and submit your email
   address and we'll conta= ct you with instructions when the Beta is
   ready=2E
   &=23160;
   3D=22=22 3D=22=22
   Top Threats
   Below are some of the latest threats identi= fied by PC Tools
   [18]Malwa= re Research Center:
   [templat=]
   [19]Adware=2EBHO=2EGEN
   3D=22High
   [20]Backdoor=2EPoison
   3D=22High
   [21]Exploit=2EAdobeReader
   3D=22High
   [22]Trojan=2EBuzus
   3D=22High
   3D=22=22
   The above infections can = be detected and cleaned using [23]= PC
   Tools Internet Security or [24]Spyware Doctor with AntiVirus=2E
   3D=22=22 3D=22=22
   =
   =

   3D=22=22
   =3D=22=22 =3D=22=22 =3D=22=22 = =3D=22=22 =3D=22=22 =3D=22=22
   =3D=22=22 <= /td> = =3D=22=22 =3D=22=22
   SECURE & PROTECT<= /span> REPAIR & OPTIMIZE
   3D=22=22 [25]Spyware Doctor(TM) with AntiVirus 3D=22=22 [26]Registry
   M= echanic(TM)
   3D=22=22 [27]PC Tools In= ternet Security(TM) 3D=22=22 [28]Desktop
   Maestro(TM)
   = =
   3D=22=22
   This message was intended for 'doc=40freebsd=2Eorg'
   =
   You have received this message because you are subscribed to 'PC Tool=
   s newsletter and special promotions'=2E[29]
   Update your= subscriptions =7C [30]Unsubscribe =7C To contact us pl=
   ease email [31]reply-newsletter=40em= ail=2Epctools=2Ecom

   PC T= ools Limited
   Brookvale Plaza, East Park, Shannon, Co=2E Clar= e, Ireland=2E
   Copyright =C2=A9 2009 PC Tools=2E All rights reserved=2E=

   [eof?iJmslDZZXDUEKhJFMkLLIlKDhknE=]

References

   Visible links
   1. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?i=
   2. 3D=22http://email=2Epctools=2Ecom/servlet/ff/c?iJltkQAAWQSVKhJxMjL=
   3. file://localhost/tmp/3D=22=23Heuristics=22
   4. file://localhost/tmp/3D=22=23Blog_Safari=22
   5. file://localhost/tmp/3D=22=23Conference=22
   6. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV=
   7. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV=
   8. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMj=
   9. 3D=22http://www=2Ethreatfire=2Ecom/=22
  10. 3D=22http://ema=/
  11. 3D=22http://email=2Ep=/
  12. 3D=22http://blog=2Ethreatfire=2Ec=/
  13. 3D=22http://blog=2Ethreatexpert=/
  14. 3D=22http://blog=2Eiantivirus=2Ec=/
  15. 3D=22http://email=2Epctools=/
  16. 3D=22http://blog=2Ethreatfire=2Ecom/=22
  17. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQ=
  18. 3D=22http://email=2E=/
  19. 3D=22http://email=2Epctools=2Ecom/s=
  20. 3D=22http://email=2Epctools=2Ecom/s=
  21. 3D=22http://email=2Epctools=2Ecom/s=
  22. 3D=22http://email=/
  23. file://localhost/tmp/3D=22ht=
  24. file://localhost/tmp/3D=
  25. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJ=
  26. 3D=22http://email=/
  27. 3D=22http://email=/
  28. 3D=22http://email=2Epctools=2Ecom/se=
  29. 3D=22http://email=2Epctools=/
  30. 3D=22http://email=2Epctools=2Ecom/servlet/cc=
  31. 3D=22mailto:reply-newsletter=40email=2Epctools=2Ecom=22

   Hidden links:
  32. 3D=22http://email=2Epctools=2Ecom/servlet=
  33. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AB82A7F.0000079E>