Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

I want to stop firewall restart after in setings desactivate

How to stop for good Mcafee Endpoint security firewall
In setting i come over and stops and restars
i delete the module from remove software and when update re installit

How to stop that service for good?
0
Big Business Goals? Which KPIs Will Help You
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

This is a planning in writing a vbscript to find out PC OS, service pack, missing patches, computer name, antivirus software installed, personal firewall, and so on. This vbscript was evaluated and works without problem. The "last piece" of the check that we are thinking to put in is the checking of PC for any possible infection of virus. How do we ensure that the pc is really virus-free? Can we write a script to check for some "run", "runonce", and other registry key and values? the objective is this seems to be a "preliminary" check for the virus infection, malware, spyware, and so on. MS Windows clients from windows 7 to windows 10.

If so, any sample for the script on this virus checking?

Thanks in advance.
1
What is a good portable antivirus to use from USB flash drive?
0
Hi I have been setting my clients in windows defender sandbox mode.  Question, when I run the setx /m mp_force_use_sandbox 1 on Windows 7 it seems to update correctly.

Question, can Windows Defender be run in sand box mode?  I get mixed answers on line.

Thanks a ton.
0
Ransomware. Last week. I gave my indian developer RDP access to my local server on a zte f660 router.  Normally I was using the HP MSR930 JG511A, but there was connectivity issues as we switched ISP, and they recommended we don't use it the HP anymore. strictly been relying on the zte.

Today,  I got the shock of my live, was like a movie. ransomeware. find attached.

1. Where is the issue most likely from.. is it from the router?... or from other sources?
2. Do I actually have to pay them to get my system back up.. cos I don't really have  a backup..
3. How do I prevent this?
4. How do I backup my local server.. it's  VM ware?
0
This question is not for me but it should serve the community. A question gets more attention than a post, I guess, that's why.

There is an exploit that was published on December 19th. It enables non-admin users of windows systems to read files that they normally wouldn't be allowed to access.
Implications should be obvious: shared systems such as terminal servers or department laptops will be the primary targets.

I will provide the sha256 hash value: 6711ea982ae9a03f8ba5e555c49cefe36dd7ae9991e742e3b5b1d214d02409c1

Insiders will be able to create a custom AV detection using that hash!
Now for the question: If you want to earn points and serve this community, please add a description about how to add a custom detection for any of these AV products that, as of now, still don't detect this malware:
--
Acronis
AhnLab-V3
Alibaba
Avast-Mobile
Avira (no cloud)
Babable
Baidu
Bkav
CAT-QuickHeal
ClamAV
CMC
Comodo
CrowdStrike Falcon (ML)
Cybereason
DrWeb
eGambit
Endgame
ESET-NOD32
F-Prot
Ikarus
Jiangmin
Kingsoft
Malwarebytes
MAX
NANO-Antivirus
Palo Alto Networks (Known Signatures)
SentinelOne (Static ML)
SUPERAntiSpyware
Symantec Mobile Insight
TACHYON
TheHacker
Trapmine
Trustlook
VBA32
VIPRE
ViRobot
Yandex
Zillya
Zoner
--
0
Background: Helping a friend troubleshoot problems on his Windows 7 Home system, which may have malware or a virus, among other issues. He claims to have the latest, up-to-date Microsoft Security Essentials and a version of Malwarebytes with real-time protection. His system has TeamViewer (free for personal use), but I don't know the version. My W7 Pro system has the latest, up-to-date MSE and MBAM Premium (real-time protection), and the latest TeamViewer 14.1.3399 (free for personal use).

Question: Can malware or a virus on his system traverse the TeamViewer connection and infect my system?

Thanks much, Joe
1
I’m trying to compare the two solutions, between Webroot anywhere secure with DNS protection or Sophos interecptX advanced with EDR.
I do have a Sophos Firewall, but I’ve been using Webroot for now and just tested InterceptX and I have to decide which route to take.


Does anyone have any recommendations?
0
does anyone know how viruses such as Hermes 2.1 infect machines on a local network ? if a user executes it on their machine does the virus then try and copy its self to other machines on the network or does it try and encrypt the drives remotely ?
0
I am working for a client that would like to leverage Windows Defender as their endpoint security solution.  I would like to recommend a different endpoint security solution to them in favor of Defender.  How would you make your recommendation to the team and what talking points would you focus on?

Let’s say you’ve been successful in your recommendation and the client decides to implement the solution you pitched.  About 6 months after you are done with the implementation, issues start to arise and the cause seems to be the endpoint security solution you recommended and implemented.  The client is asking to have the issues resolved immediately, however the vendor is not being responsive or supportive, and has indicated they may not have a fix for the problem.  The client is also alluding to wanting to move back to Defender.  What steps would you take with the client to alleviate their concerns about your recommended product, and what steps would you take with the vendor to ensure prompt replies and a sense of urgency?
0
Determine the Perfect Price for Your IT Services
Determine the Perfect Price for Your IT Services

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden with our free interactive tool and use it to determine the right price for your IT services. Download your free eBook now!

The client complains about the expense on antivirus software. What solution are you using for a company running over 150 computers?
This client has been using Trend Micro for over a decade, which is installed on servers and PCs. Every year when renewing the software, the client always questions
- Is there anything cheaper but doing the job?
- Can we disable internet access on certain computers and save the license on them?

I am so fxxking annoyed.
1
Dear All


            i have 3 of our window 10 hp laptop having below symantec endpoint popup during working hour, and when this box popup all my share drive got disconnected, any idea how to get this fix ?


1

Keith
0
We have used Symantec Endpoint Protection for antivirus for the last 10 years. But now that Windows Defender keeps getting better and better (specifically the new sandboxing) I am considering abandoning Symantec. The reason we haven't been able to make the switch yet is that I need the central notifications, so that as the admin I know of every infection, and also need to verify that definitions are updating on all PCs.

I once heard something about a third party package that uses the Defender engine but adds a management layer on top of it. What are some packages that do this? Any recommendations?
1
my i phone X plus is beyond messed up yet apple has tested it. they say all is ok. i just wrote out my question where did it go?
0
i have an apple iphone X plus. it has not worked properly since bought 7 months ago reports from apple come out as functioning good yet i think this is the most craziest iphone yet. its acting like its being shared or other devices have access  my apple id password . been to apple store support cases galore have had the cell wiped and reinstalled os plus all apps yet 24-72 hrs later. i get a wrong password msg. this has happened way too often to brush off as misspelling. as well cell has gotten even crazier. settings r coming on without my input. there are written flaws now being admitted by apple. my question is how can a cell thats been tested by apples high quality  equipment not pick up any of problems like my voice mail is in french my cell rings low most times plus i have to enter my passcode to answer? by time the calls is gone

wacky iphone X plus
0
Hello.

With Symantec

I kept on getting
Symantec blocked an attack by: System
infected W32.Cridex Activity 10

Popping
0
Some virus is filling up my HD, malwarebytes can't find the problem
any idea of what to do?
0
https://thehackernews.com/2018/12/china-ransomware-wechat.html?m=1

referring to above link, it did not give the hash for the malware but I need to check if signature has been released by Trendmicro.

Once I have the hash value, can enter into virustotal to check
0
We are having and issue with deleting computer profiles. This profiles are usually deleted during the nightly reboot and reloaded at logon. After a closer look, the issue is with a hidden log file in the profile for Avast. So I logged into one of the computers having this problem to troubleshoot it. Logged in with a admin account. Tried to take ownership so I can deleted it. All I have tested will not allow it. Never, had this issue before. This is one Windows 7 computers.

Any ideas would be appreciated.

Regards,
ABBEadmin
0
High-tech healthcare
High-tech healthcare

From AI to wearables, telehealth to genomics to 3D printing — healthcare technology is seeing rapid advancement. Experts believe that this technological advancement will save money and save lives. Healthcare is changing dramatically, and emerging technology drives that change.

I don’t want MS security essential as it’s giving errors and won’t uninstall or upgrade

So need an alt

Thanks
0
When we get threat intels info for hashes to be added to Trendmicro
Officescan, the MD5 or SHA1 hash value has to be entered into an
IOC Editor (we use Mandiant's ie
 https://www.fireeye.com/content/dam/fireeye-www/services/freeware/ug-ioc-editor.pdf)
 to generate 2 values indicated by 1st value & 2nd value enclosed in "...'  below.

However, sometimes, the intel that comes in can be more than a hundred, so this makes
it very tedious to manually generate the values & populate into the IOC file for Officescan
to read in.  Is there an automated way / script to generate the 2 values for each hash &
auto-populate (using script etc) or an easier way for Officescan to read in just the hash
values?    Have logged a case with Trendmicro & was advised to do it manually which
does not help at all.

attached the full IOC file.


   Sample IOC file's content:
   ====================
<?xml version="1.0" encoding="us-ascii"?>
<ioc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" id="2146113a-1513-4be6-b07e-f43969847a6a" last-modified="2018-12-02T02:19:17" xmlns="http://schemas.mandiant.com/2010/ioc">
  <short_description>Default</short_description>
  <authored_date>2017-09-26T02:58:26</authored_date>
  <links />
  <definition>
    <Indicator operator="OR" id="a1c825b0-ae7f-4461-85dd-25a20720acac">          <== 1st value enclosed in "...";  once only for entire IOC file
      <IndicatorItem …
0
A user was infected with the trojan.emotet and now my computers are constantly be hit wiht Artemis! Trojans through out the day.

I have the McAfee Endpoint Security, which catches and deletes it.

However, does anyone knows how I can get rid of this?

Any help in this will be most appreciated.McAfee-Alert.PNG
0
I am looking into general anti-virus management / monitoring best practices (regardless of vendor). I basically want a check list  for comparison to actual of:

-what our administrators should be alerted on from the AV agent / software installed any client device,
-what they should be able to produce in terms of compliance reporting for all their managed devices specific to AV.
-What kinds of issues they should be looking for when reviewing logs/alerts specific to AV on a daily basis

I will then use these to compare what they can produce from their central AV monitoring console(s) for a sample of devices or even all devices listed in other information sources such as AD, system centre or our asset management DB. I presume the 3 basics would be status (on or not), definitions last updated, last scheduled scan date. Are there any others?

There seems to be an assumption AV setup/config/management is pretty hard to get wrong but from some recent health checks for PCI DSS I noted on the findings many issues such as out of date signatures, AV not even running in some cases on devices etc.
0
Emotet Trojan!!

Currently dealing with an Emotet Trojan on a domain network with around 20 machines.

I know that the files replicates itself across the network and is generally a massive pain and is quite aggressive.

Does anyone have any tips at all that I could use to try and eradicate the malicious code.

I thought I cleared it by taking all machines offline and manually cleaning them by removing the files that were sat in SYSTEMROOT and user appdata etc.

Any pointers would be really appreciated, also if there is any specific software that removes this Trojan, that would also be of great help.

Thanks!!!
0
our server and all computers have been hit by trojan.emotet virus. are there any available tools to remove the trojan. we have installed Malwarebytes 3 premium which detects and quarenteens the various out breaks. we clean up the exe's that are generated and remove registry settings for them but they come back each time.
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.