[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi Experts,

We recently had one of our employees click on a link in a e-mail that took him to a fake site where he entered his credentials and his e-mail account was compromised.
Management hired a cyber security company who did scans on the systems, his e-mails and also other things on the web.
We have managed symantec Endpoint protection, intrustion, malware which is up to date and active.  
We also didn't have anything on the back end set up (per management) to protect our e-mail against spam, malware, all e-mails were to come through.
The cyber people are telling management that Symantec only gets 20% of intrusions, viruses and malware.  (I don't believe that, I have a e-mail box flooded with all the intrustions Symantec is getting and not one virus in 4 years which it caught).
Management from their advice is most likely going to force me to uninstall Symantec from all of our workstations and servers and deploy Carbon Black?

Can anyone tell me if this sounds as insane as it I think it is?  Anyone familiar with Carbon Black?  

Please help, I don't trust this at all and would love to be proven right or wrong.  I think this cyber company might be banking on management fears from my co-workers mistake.

Thank you
0
Redefine Your Security with AI & Machine Learning
Redefine Your Security with AI & Machine Learning

The implications of AI and machine learning in cyber security are massive and constantly growing, creating both efficiencies and new challenges across the board. Check out our on-demand webinar to learn more about how AI can help your organization!

I want to know what are the experts recommendation to the best method to block the annoying ads in chrome Edge? It seems every time I visit a website medical, department store etc. I am being bombarded with heavy artillery of ads. It makes me not want to surf the web anymore. Please help.
0
I'm currently looking at McAfee DLP 11.0 Endpoint to use for PCI/credit card data discovery. One thing I am wondering, will DLPe only scan a system while a user is active or can it scan/discover data on a system while no active users are logged in?

Hoping someone might have some insights on this. Thank you.
0
September 2018 AV Comparison Results are now available.

Real-World Protection Test September 2018 – Factsheet
Malware Protection Test September 2018

Some surprising stats this issue. See how your preferred AV fared in the tests...

0
hi i suspect that my pc got virus after i start the pc the hhd space is decreasing after hour am left with only 5mg but when i start pc again i will have 5bg in my hhd am using norton antivirius my pc is window 10
0
Q1:
I'm trying to establish if my Officescan  has Officescan's Ransomware protection below :

Ransomware Protection Enhancements in OfficeScan 11.0 SP1 Critical Patch 6054
Detection details of the OSCE 11.0 SP1 Critical Patch 6054 Ransomware Prevention Summary widget

Above 2 lines are extracted from link below:
https://success.trendmicro.com/solution/1111377-enabling-the-ransomware-protection-feature-in-officescan-osce


Q2:
Last screen in the attached shows  Scheduled Scan is disabled : is it a good idea to enable it
& I thought to have it enabled either during lunch hours (for users who bring home their
laptops) or in the night (for users who leave their PCs/laptops powered on in the office at night):
I've heard many recommendations that on-demand scheduled scan is quite essential too.
Just that it's hard to determine which laptops are being brought home

attachment is what's shown on my laptop
TMofficescanver.docx
0
a couple of years back, Trendmicro's  .DAT file can be searched using (find or grep command) for
certain malware names.

I'm now using OfficeScan V12.0.1352 & I think the signature file is VsapiNT.sys

I'm trying to track if  globeimposter  ransomware is in our current officescan signature &
the 2 links below seems to say that TM has documented them quite some time ago:
 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-4th-2017-globeimposter-notpetya-and-more/
 https://www.trendmicro.com/vinfo/in/security/news/cybercrime-and-digital-threats/ransomware-recap-crypshed-spoofs-amazon-in-ransomware-campaign

but when I searched for "glob"  (I suppose FakeGlobal as it's known to Trendmicro) would have it
listed in the latest VsapiNT.sys signature but it's not there:
appreciate steps on how to list the malwares covered by Officescan's signature file:

C:\foren>find/i "glob" *.sys |more

---------- TMPREFLT.SYS

---------- TMXPFLT.SYS

---------- VSAPINT.SYS
GlobalAddAtomA
GlobalAddAtomW
GlobalAlloc
GlobalCompact
GlobalDeleteAtom
GlobalFindAtomA
GlobalFindAtomW
GlobalFix
GlobalFlags
GlobalFree
GlobalGetAtomNameA
GlobalGetAtomNameW
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalSize
GlobalUnWire
GlobalUnfix
GlobalUnlock
GlobalWire
MakeCriticalSectionGlobal
JungUm Global
Corel Global Macro(GMS)
GLOBAL:
GLOBALNE:
GLOBALDOTPROMPT
GLOBAL
GLOBAL.DOT:
GLOBAL:
ExecuteGlobal
Global
0
The user has Outlook 2016, and is connected to an Exchange account hosted by a very large email hosting company - Intermedia
Windows 10

They have noticed that their return address has been swapped out with an address at outlook.com    outlook_FB8C126A98221F43@outlook.com

I checked Outlook Web App, and mail sent using OWA has the right return address.

Their computer is protected with the latest version of MalwareBytes and Windows Defender.

This looks like some sort of Malware that MalwareBytes hasn't caught?

What should I use to scan the system with?


Thanks
0
Hello -
A friend of mine has files on a USB drive that was infected with a virus. There was a ransomeware message stating their files were encrypted and asking them to pay a large amount of money if they want their files back. All of the files on the USB have a file extension of .pdf.zcdgu. Has anyone seen this before?  If so, is there a way to remove it?
0
we have mcafee endpoint enterprise 4.4 running on windows server 2008 r2.

agents installed on 1500 clients

we are now moving to windows 2016 and I need to move my antivirus to the lates version on to a  windows 2016 server.

can I get the migration procedure of mcafee and what is the the upgrade path to the latest version
0
CompTIA Cloud+
LVL 12
CompTIA Cloud+

The CompTIA Cloud+ Basic training course will teach you about cloud concepts and models, data storage, networking, and network infrastructure.

Q1:
Without saving an email's attachment & then manually (ie on-demand) scan the
saved file, is there any AV that could auto-scan (ie in almost real-time or on-access)
an email attachment (even before the user double-click/open the attachment)?

Q2:
Can BitDefender or Trend's Officescan do the above?
0
I've seen an ex-colleague blocking file extensions from being created using a feature in McAfee
(can't recall the name).

Can someone provide the steps to do this in Trendmicro Officescan's management console?
What's this feature called in Officescan?
0
Residential client brought a computer the other day that is interesting.  He has a folder on the desktop named "TOOLS".  Inside the folder are random picture files by extension and misc other extensions.  38,000+ files in fact.  I cannot delete the folder under any OS (Linux, Ubuntu, Windows, Windows PE) connecting it to another system.  I have tested the drive with WD Lifeguard diagnostic and found no problem.  No performance issues with the drive (Seagate 500GB).  SMART shows no concerns.  CHKDSK shows MFT is corrupt and repairs.  Norton and many other virus scanners find every file in the folder to be a virus, ADS, or something unwanted beyond PuP.  I have never failed to remove a folder or file under Ubuntu.  Another note is that it generally takes hours to access the profile folder in order to even see the TOOLS folder.  Running scans took days to get partially through the TOOLS folder and cannot remove anything as of yet.  Most of the scans are performed on a bench PC with this drive attached, and still have problems.  I assume it is a combination of HDD problems (which I cannot determine) and virus infection.  The folder appears to have been created in September 2014.  The user has no recollection of how it came to be or when.  He did state that years ago he got a fake tech scam call and let them into his computer.  He only does e-mail and web browsing, so there wasn't anything exciting to steal from him.  He didn't pay them, and that was the end in his mind.  This is …
1
To protect our corporate users from being compromised when they
connect to outside Wifi (which may be potentially rogue Wifi), is it
feasible if we implement MS Direct Access or Always-On-VPN?

https://technet.microsoft.com/en-us/library/dd759144(v=ws.11).aspx
https://directaccess.richardhicks.com/tag/directaccess-alternatives/

The products above would establish a tunnel so the rogue Wifi can't
steal credentials nor data & with VPN established, I suppose malwares
can't infect the laptops as the rogue Wifi has no connection to the laptop
(tunnel-protected) or did I get this idea wrong ie can still get infected
even with such tunnel??

We still want the users to be able to access Internet but protect them
in the event they're using a rogue Wifi
0
Hi,

I am facing an error 80070005 when windows server 2008 SP2 enterprise X64 update. I tried to restart the server but the update still not working

Thx
0
how do you remove the browser hijacker "smart Search" (weknow.ac) from a chrome browser on a mac?
0
Symantec Endpoint Protection Manager not getting updates after upgrading to 14.2 build 770

upgraded my symantec server to latest version and no live updates is getting downloaded, i uninstalled live update and reinstalled. also registered with SEPM via command prompt
1.png
0
Hasn’t happened but just wondering

If my google drive got hit and all files encrypted can I revert back to last weeks clean files ?

So I’m asking does google drove afford any sort of fall back plan for this scenario ?

Thanks
2
What is the easiest and most effective way to get rid of the Trojan.JS.Dropper.E?
1
Big Business Goals? Which KPIs Will Help You
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

Dear Team, our server 2008R2 has many AVP.exe processes (Kaspersky Endpoint Security) that we could not stop. It showed errors when we tried to end task:

avp.PNG
avp1.PNG
We also tried some commands on CMD/PowerShell but it did not help. Administrator has FuLL-control right but it keep showing "Access is denied"
taskkill /PID "number" /F
Get-Process -Name "avp" | Stop-Process -Force


Could you please suggest? Many thanks!
0
I have a Laptop (Windows 10 Pro 64 bit) that is infected with the virus/malware that displays a Microsoft window/logo claiming that the laptop is infected and I need to call this 1-800 number to reach a Microsoft support technician to resolve the infections/issues on the laptop.  I know it is not a valid 800# and it is an infection.  This is the third time in a year this has popped up on this laptop.  I feel that I am NOT cleaning the laptop properly !!!  Perhaps missing a "Trojan package" or something.  Any suggestions for a proper thorough scanning/cleaning/removal process on this Laptop.  Thank-you
0
I need to find out if my desktop can be fixed for free, using my own skill level and get my pop ups and get the virus out of my computer.  I do not have  much savy on computers and i really like using but the last two years or longer, it's been going on. Linus 17 has kept every type of self help from being done. That's why i am here, because i am at my wits end. Can you help me at all, for free, or is it out of the question?  Desperate in the Hoosier state, and i do not mean maybe.
0
I am looking for a step by step tutorial regarding comodo ITSM antivirus. I need to know how to install , what feature is needed to installed and how to configure.
Also how to configure profiles and containment and how to use the last 2 subject.
0
I have a new client with a light speed web filter appliance. It's currently licensed for just web filtering. Does anyone know if they also offer licensing for virus/malware filtering and detection? I am waiting for a call back from sales but this is time sensitive.

Thanks
0
How to generate and install SSL certificate for Avast?  -- Never worked with SSL certificates, always had someone else do it.    I am installing the Avast Business Management Console on my Win7 Pro workstation to manage the installation of Avast Business Pro on 3 servers (SBS2011, Server 2008, Server 2008 R2) and 7 desktops (Win7Pro, Win10Pro).   During the installation it prompts as to whether 'I have my own SSL certificate'  OR  'I don't have my own SSL certificate'.   The install states that 'We will generate a self-signed certificate which is good enough for temporary testing purposes.  However, it does not meet high security standards, therefore we recommend to use own SSL certificate.'  

Can you point me in the right direction?

Thank you.
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.