How To Remove Alpha Antivirus (Removal Guide)

Wednesday, September 23rd, 2009

There is a new rogue among us. It appears that Alpha Antivirus has replaced Personal Antivirus as one of the latest rogue security programs. This particular rogue installs through online “scans” (popups.) The reason I say “scans” is they’re essentially animations of a scan (every one that visits the site will see the same thing […]

Clampi Virus | Clampi Trojan

Monday, September 21st, 2009

The clampi virus is in the news in a couple places today. Surprisingly it’s in Symantec’s virus database since January and rated as a low risk. However, the sole purpose of this trojan is to monitor your Windows based computer for connections to more than 4500 different financial related sites and log any usernames and […]

Trojan horse proxy.ahiy and AVG

Wednesday, September 9th, 2009

A lot of people seem to be reporting today that AVG is finding files to be infected with trojan horse proxy.ahiy or trojan horse proxy ahiy. From what I’ve seen, although that may be a valid virus designation from AVG, they are also reporting many legitimate files as this trojan proxy ahiy. AVG is acknowledging […]

Major botnet building and the massive jump in spam

Thursday, November 9th, 2006

For a few months now (since the demise of bluefrog actually) I’ve noticed that the level of junk mail has gone up on my own mail server. Yes, I use spamassassin to filter and tag, but the volume of stuff that’s tagged has gone up (as well as the volume that slips through.) I’ve had […]

Would you like spyware with that? Apple too….

Tuesday, October 17th, 2006

These stories come up from time to time. A free giveaway of some sort and it turns out that there’s spyware or a virus embedded, company gives a big “whoops” and fixes things by replacing them…. McDonalds had a promotion going where up to 10,000 people could win a flash based mp3 player they also […]

Beware visiting Samsung’s site

Friday, September 8th, 2006

Betanews is reporting that Samsung’s site has been hacked and is currently serving up malware in some areas. user intervention is required for it to run on the users pc, but be cautious. Samsung has been notified, but as of Friday morning (according to the report) the trojan horse is still there. I really wonder […]

Powerpoint vulnerability (August 2006)

Tuesday, August 22nd, 2006

I’m having to make sure I put the date in the title of these posts now…. over the weekend there were rumors of a new powerpoint vulnerability. Sans had an early notice of some trojan droppers using powerpoint files. And by the 20th (Sunday) it was being called a 0-day. There is a good FAQ […]

Firefox 1.5.0.5 out and be cautious with extensions…

Monday, July 31st, 2006

Well, let’s start with the extensions first. Like ANY software, you should be cautious installing something from an untrusted source. If you think an extension looks neat and cool – look for reviews and third party information before installing it. That much said…. never install an extension that comes attached as an unexpected email…. Apparently, […]

Pretty, shiny usb drive is all it takes to compromise security….

Thursday, June 8th, 2006

Sometimes you just want to cry… This writeup is an example of the “soft underbelly” of every network’s security plan… the users. Basically, you have a group that was hired to do a computer security audit of a credit union. They were told that some of the main concerns were social engineering (easy sharing of […]

New malware sightings

Thursday, June 8th, 2006

Incidents.org had an entry in the last couple days on a malware infestation that was interesting and showed a couple things. 1) You can’t bet on antivirus to keep you safe (the initial installer was not detected by most AV vendors – suspicious by 1.) (If you think about it, this makes perfect sense – […]

Google
 
Web www.averyjparker.com