Lavasoft Security Bulletin - April 2014: Top Threats
Top 20 Blocked MalwarePositionAd-Aware detection% of all threatsChange in...
View ArticleLavasoft Security Bulletin - April 2014: Bot Review
Bot ReviewTable: Bots under analysis (April 2014, Lavasoft MAS). {mso-displayed-decimal-separator:"\,"; mso-displayed-thousand-separator:"";} .xl1520865 {padding:0px; mso-ignore:padding; color:black;...
View ArticleLavasoft Security Bulletin - May 2014: Top Threats
Top20 Blocked MalwarePositionAd-Aware detection% of all threatsChange in...
View ArticleLavasoft Security Bulletin - May 2014: Bot Review
Bot ReviewTable: Bots under analysis (May 2014, Lavasoft MAS). {mso-displayed-decimal-separator:"\,"; mso-displayed-thousand-separator:"";} .xl1520865 {padding:0px; mso-ignore:padding; color:black;...
View ArticleKelihos Adopts Anti-Analysis Technique
Since the end of April we discovered that Kelihos adopted an anti-analysis functionality. The backdoor detects the presence of the following processes running on a computer that are related to malware...
View ArticleBeware of FIFA World Cup 2014 Scams
The FIFA World Cup 2014 in Brazil is being used as a lure for numerous tricks aimed to get your money or show you unsolicited advertisements. Last month Symantec wrote about an email scam where the...
View ArticleBundled Software: Good or Evil?
In July’s potentially unwanted program (PUP) prevalence report sees detections with family names containing "Application.Bundler" such as Application.Bundler.Somoto.I, read more
View ArticleThe PUP That Can Detect Anti-Malware Programs
In last month’s Security Bulletin we talked about issues surrounding bundled software and explained why AV companies often detect such programs as potentially unwanted programs a.k.a ‘PUP’. This month...
View ArticleLavasoft Security Bulletin - September 2014: Top Threats
Top20 Blocked Malwareread more
View ArticlePUPs with Rootkit
We discovered numerous cases of installing PUPs that contain a rootkit component to protect its files, registry keys and processes in a system. This component is used defend itself from removal by...
View ArticlePotentially Unwanted Program Self-Protection Technologies
Last month we discussed potentially unwanted programs that use rootkit components to protect some of their files and registry keys against modification and removal.This month we will illustrate other...
View Article