Anti Keylogger Shield – protect against keyloggers

April 10, 2008 – 10:26 AM

Anti Keylogger Shield is a powerful, easy to use anti-spy software tool that prohibits operation of any keylogger, either know or unknown, professional or custom made. Once installed, Anti Keylogger Shield will run silently in your System Tray, block the system mechanisms that are exploited by keyloggers, and protect your privacy immediately and constantly.

Anti-Keylogger

Keyloggers are small spy programs, that record everything one types on the computer, including documents, emails, usernames and passwords, and then either store this information in a hidden place on your computer for the person to obtain it later or send it over to the Internet to the person who infiltrated it.

Keyloggers can come in many ways, as emails, viruses, trojan horses; from people you know might try to invade your privacy and see what you are typing, or remote hackers might want to stole usernames and passwords as you type it.

Unlike similar programs, Anti Keylogger Shield does not use a signature database, and it will not try to detect keyloggers. Anti Keylogger Shield will simply block the very mechanisms that are used by known and unknown keyloggers, and these will not work anymore.

Homepage

Download here.

Trend Micro Web Protection Add-On

April 10, 2008 – 9:47 AM

Complement your existing desktop protection (see list below) with Trend Micro Web Protection Add-On—a lightweight add-on trial solution designed to proactively protect your computer against Web threats and bot infiltration. Web Protection Add-On uses Trend Micro’s revolutionary in-the-cloud security technology to monitor outbound Web requests. This real-time protection proactively scans for malicious threats hosted on compromised or specially targeted Web sites in the cloud, before they can reach the desktop. In-the-cloud bot behavior analysis is designed to detect suspicious behavior that might indicate malicious software designed to secretly take control of your computer for criminal purposes.

Key Benefits

  • Fills a critical security gap, working alongside existing desktop security solutions
  • Designed to block access attempts to potentially malicious Web sites in real-time
  • Monitors for potential bot infections using innovative in-the-cloud behavior analysis
  • Alerts users when Web threat- or bot-related activity is detected
  • Directs infected users to Trend Micro HouseCall for a full system scan and clean

Download the 60-day Trial here.

ActiveX KillBits

April 10, 2008 – 5:19 AM

The CLSID for an ActiveX control is a GUID for that control. You can prevent an ActiveX control from running in Internet Explorer by setting the kill bit so that the control is never called by Internet Explorer when default settings are used.

The kill bit is a specific value for the Compatibility Flags DWORD value for the ActiveX control in the registry. This is different from revoking the “safe for scripting” option in an ActiveX control. When the “safe for scripting” option is revoked, Internet Explorer still calls for the control and then prompts you with a warning message that the ActiveX control may be unsafe. Depending on the choice you make, the control may be run. However, after the kill bit is set for an ActiveX control, that control is not called by Internet Explorer at all unless the Initialize and script ActiveX controls not marked as safe option is enabled in Internet Explorer. To set the kill bit, follow these steps:

Read the rest of this story…

Web Users in Malware Crosshairs

April 9, 2008 – 6:50 PM

Online malware attacks are becoming more pervasive, targeted, and refined as the underground threat economy continues to evolve and take on the characteristics of an organized industry.

The latest iteration of Symantec’s Internet Security Threat Report — covering its research over the final six months of calendar 2007 and released on Tuesday at the ongoing RSA Conference 2008 in San Francisco — finds that malware authors and the ecosystem of constituencies supporting cyber-crime are advancing the sophistication of their efforts at a staggeringly expeditious pace.

From the groups of exploit developers marketing malware toolkits to aspiring attackers to the people buying and selling stolen credentials, the entire landscape of electronic crime is taking off and increasingly resembles the security software community that is working to thwart it, Symantec researchers said.

In his keynote address at the RSA show, Symantec Chief Executive John Thompson reported that there is now more malicious code being created worldwide than there is legitimate software.

The trend is changing both the way that people view IT security in general — and the manner in which companies like Symantec will need to rethink their anti-malware strategies, the executive said.

Read the rest of this story…

Microsoft Details Internet Explorer 8 Security

April 9, 2008 – 5:24 PM

At the RSA Security Conference I caught up with Austin Wilson, Microsoft ‘s Director of Windows Product Management and learned a few tidbits about security enhancements coming in Internet Explorer 8. IE8 will address three specific areas where security can be a problem: social engineering, traditional browser vulnerabilities, and attacks on Web servers.

If the bad guys can trick you into giving away your personal information, they’ve won with almost no effort. IE8 builds on the anti-phishing protection that first showed up in IE7 but goes deeper in its analysis of suspicious pages. Wilson noted that Microsoft’s own network shrugs off a million phishing attempts a week–the problem is huge. Also, IE8’s address bar will boldface the actual domain and dim the rest of the address, so you won’t be fooled by something like www.ebay.notreally.com/stealpassword.html.

Data Execution Prevention blocks any attempt by a program to write into executable memory or execute code in an area marked as data, thereby preventing buffer overruns and similar attacks. In Vista DEP is turned on for all essential system components… except the browser. Because of backward-compatibility concerns, DEP isn’t active in IE7. Not only will IE8 have DEP turned on, it will also run each tab in its own separate process. That way, if a badly written add-in or an actual malware attack triggers DEP, it won’t kill the whole browser, just the tab involved. And if IE8 really does crash completely, the new automatic-recovery feature will allow it to reopen all tabs when it restarts.

Read the rest of this story…