From owner-freebsd-doc@FreeBSD.ORG Tue Sep 22 01:53:12 2009 Return-Path: Delivered-To: doc@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3BC5F106566B for ; Tue, 22 Sep 2009 01:53:12 +0000 (UTC) (envelope-from newsletter@email.pctools.com) Received: from omp.email.pctools.com (omp.email.pctools.com [12.130.137.112]) by mx1.freebsd.org (Postfix) with ESMTP id 1B7398FC12 for ; Tue, 22 Sep 2009 01:53:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=pctools; d=email.pctools.com; h=MIME-Version:Content-Type:Content-Transfer-Encoding:Date:From:Reply-To:Subject:List-Unsubscribe:To:Message-Id; i=newsletter@email.pctools.com; bh=7zJwoPXte1jtuAdH8yYLujI7KRk=; b=LbTA7/BoEqHbZwhYiVUa+ZSvqYRNRGpmW3QU/UTVBERZequ96/KlrV6y5ioPNXzdz7PrS/wsOMeX s7FSxTpDmDdbXIIgZZuwevEIW4rwAEtQ0l0lILu6D6DGg4Mas2ernv45eSYpSJCFj4PT8odqMWco yhI3maldNKGRauxPxQA= DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=pctools; d=email.pctools.com; b=VnKF0kDPmZylS/B0hR4QWHH5dB+EctcWfNn3qSbW+aXmG1dJzN1r6NnOmJ4ac8nbdcBkfV85Xx5v iRo1tM2Wcs+0WkMNLB5K7ygEimU/lMMVq4Uo6qkGSHClzhgqn7usLLMfR0WDdxPa6BeBWXevq3Eb sfGcuYBrhK55i5G9VwI=; Received: by omp.email.pctools.com (PowerMTA(TM) v3.5r10) id hn0n0g0morco for ; Mon, 21 Sep 2009 18:38:07 -0700 (envelope-from ) Content-Transfer-Encoding: quoted-printable Date: Mon, 21 Sep 2009 18:38:07 -0700 From: "PC Tools" X-cid: pctls.664.1 X-sgxh1: KhJxMjLLIkKQhjn To: doc@freebsd.org X-valueof-CUSTOMER_ID: 6899 Message-Id: <4AB82A7F.0000079E@omp.email.pctools.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: PC Tools September Newsletter X-BeenThere: freebsd-doc@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: PC Tools List-Id: Documentation project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Sep 2009 01:53:12 -0000 <=21DOCTYPE html PUBLIC =22-//W3C//DTD XHTML 1=2E0 Transitional//EN=22 =22h= ttp://www=2Ew3=2Eorg/TR/xhtml1/DTD/xhtml1-transitional=2Edtd=22> Combat new and unknown threats with the right knowled= ge (continued)=2E If you are unable to see the images, add the domain =40email=2Epc= tools=2Ecom to your Safe Sender list or [1]view online 3D=22=22 3D=22=22 3D=22=22 [2]3D=22=22 =3D=22=22 =20 Improving our "security s= avvy" continued=2E=2E=2E=2E=2E=2E In this edition we'll be covering: [3]Heuristics= - Psychology 101? [4]Blog Safa= ri =E2=80=93 stay in touch with what's happening in the wild [5]PC Tools a= t 2009 Virus Bulletin Conference Heuristics - Psychology 101? No, this isn't an introductory Psychology lesson=21 Heuristics is a term= used to describe the different types of anti-malware technology=2E Anti-M= alware technology comes in two main forms, signature and behavioral based = protection=2E Signature based protection PC Tools use a variety of signature types, the most effective being ge= neric or smart Sliding Fit Signatures (SFS)=2E Generic signatures can detect numerous malware files with one signature= =2E This is achieved through the analysis work of the PC Tools research te= am=2E They focus on malware families, looking in collected sample files fo= r similar code that malware files in the same family have in common=2E Thi= s means PC Tools can effectively detect threats known to frequently modify= and so catering for the significant number of threat variants in the wild= =2E This technology is present in [6]Spyware Doctor&=238482;, [7]Spyware Doctor with AntiVirus and [8]PC Tools Internet Security&=238482; and delivers bett= er protection against the latest threat outbreaks=2E [=] = [sec=] Important Tip: S= chedule regular Smart Updates and keep your subscription up-to-date to ens= ure you have the latest signatures to identify malware=2E [sec=] [=] Behavioral Protection Behavioral protection analyzes the processes at the system level of yo= ur PC, constantly monitoring for suspicious activity=2E If detected the pr= ocess is immediately terminated and quarantined=2E [9]ThreatFire&=238482;<= /a> with ActiveDefense Technology is our behavioral based protecti= on=2E It's used in [10]Spyware D= octor and [11]PC Tools Intern= et Security providing you with proactive protection against Zero-Day at= tacks=2E Ideally a combination of Signature and Behavioral Protect= ion is your strongest defense against cybercrimin= als=2E [=] = [sec=] Important Tip: T= he majority of malware enters your PC via the internet so effective browse= r protection like PC Tools Browser Defender is essential=21 [sec=] [=] Blog Safari =E2=80=93 stay in to= uch with what's happening in the wild If you want to pick up interesting ideas, tips and tricks, the latest = threat news or just connect with like-minded PC users, here's a list of Bl= ogs we regularly update to help you stay in touch with what's happening in= the wild: ThreatFire blog managed by Kurt Baumgartner [12]http://blog=2Ethreatfire=2Ecom/ ThreatExpert blog managed by Sergei Shevchenko [13]http://blog=2Ethreatexpert=2Ecom/ iAntiVirus blog managed by Erwin Varona [14]http://blog=2Eiantivirus=2Ecom/ PC Tools at 2009 Virus Bulletin = Conference The [15]Virus Bulletin 2009, is one of the most informative anti-malware annu= al conferences running since 1991, is being held in Geneva, Switzerland th= is year=2E Our own Kurt Baumgartner from the [16]PC Too= ls ThreatFire research team will be presenting for a third year=2E Kur= t will be presenting on the topic "[17]AntiRE En Masse" discussing anti reversing techniques= documented in Peter Ferrie's recent set of papers published in multiple V= irus Bulletin magazines over the past year=2E Kurt will be discussing Wale= dac, Koobface, Taterf/Gamepass, and other "crimeware=E2=80=9D nailed = by ThreatFire on a daily basis=2E P=2ES=2E Don't miss out on your opportunity to test run our 2010 Securi= ty Product Release by registering to participate in the Beta Release=2E Ju= st click on the banner above and submit your email address and we'll conta= ct you with instructions when the Beta is ready=2E &=23160; 3D=22=22 3D=22=22 Top Threats Below are some of the latest threats identi= fied by PC Tools [18]Malwa= re Research Center: [templat=] [19]Adware=2EBHO=2EGEN 3D=22High [20]Backdoor=2EPoison 3D=22High [21]Exploit=2EAdobeReader 3D=22High [22]Trojan=2EBuzus 3D=22High 3D=22=22 The above infections can = be detected and cleaned using [23]= PC Tools Internet Security or [24]Spyware Doctor with AntiVirus=2E 3D=22=22 3D=22=22 = = 3D=22=22 =3D=22=22 =3D=22=22 =3D=22=22 = =3D=22=22 =3D=22=22 =3D=22=22 =3D=22=22 <= /td> = =3D=22=22 =3D=22=22 SECURE & PROTECT<= /span> REPAIR & OPTIMIZE 3D=22=22 [25]Spyware Doctor(TM) with AntiVirus 3D=22=22 [26]Registry M= echanic(TM) 3D=22=22 [27]PC Tools In= ternet Security(TM) 3D=22=22 [28]Desktop Maestro(TM) = = 3D=22=22 This message was intended for 'doc=40freebsd=2Eorg' = You have received this message because you are subscribed to 'PC Tool= s newsletter and special promotions'=2E[29] Update your= subscriptions =7C [30]Unsubscribe =7C To contact us pl= ease email [31]reply-newsletter=40em= ail=2Epctools=2Ecom PC T= ools Limited Brookvale Plaza, East Park, Shannon, Co=2E Clar= e, Ireland=2E Copyright =C2=A9 2009 PC Tools=2E All rights reserved=2E= [eof?iJmslDZZXDUEKhJFMkLLIlKDhknE=] References Visible links 1. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?i= 2. 3D=22http://email=2Epctools=2Ecom/servlet/ff/c?iJltkQAAWQSVKhJxMjL= 3. file://localhost/tmp/3D=22=23Heuristics=22 4. file://localhost/tmp/3D=22=23Blog_Safari=22 5. file://localhost/tmp/3D=22=23Conference=22 6. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV= 7. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV= 8. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMj= 9. 3D=22http://www=2Ethreatfire=2Ecom/=22 10. 3D=22http://ema=/ 11. 3D=22http://email=2Ep=/ 12. 3D=22http://blog=2Ethreatfire=2Ec=/ 13. 3D=22http://blog=2Ethreatexpert=/ 14. 3D=22http://blog=2Eiantivirus=2Ec=/ 15. 3D=22http://email=2Epctools=/ 16. 3D=22http://blog=2Ethreatfire=2Ecom/=22 17. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQ= 18. 3D=22http://email=2E=/ 19. 3D=22http://email=2Epctools=2Ecom/s= 20. 3D=22http://email=2Epctools=2Ecom/s= 21. 3D=22http://email=2Epctools=2Ecom/s= 22. 3D=22http://email=/ 23. file://localhost/tmp/3D=22ht= 24. file://localhost/tmp/3D= 25. 3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJ= 26. 3D=22http://email=/ 27. 3D=22http://email=/ 28. 3D=22http://email=2Epctools=2Ecom/se= 29. 3D=22http://email=2Epctools=/ 30. 3D=22http://email=2Epctools=2Ecom/servlet/cc= 31. 3D=22mailto:reply-newsletter=40email=2Epctools=2Ecom=22 Hidden links: 32. 3D=22http://email=2Epctools=2Ecom/servlet= 33. =3D=22http://email=2Epctools=2Ecom/servlet/cc6?iJltkQAAWQSVKhJxMjLLIkKQhjnV=