The Latest in IT Security

Posts Tagged ‘FakeAV’

Some of you may remember the golden age of rogue antivirus software (AKA FakeAV) circa 2008. These programs that were often pushed via aggressive advertising and bundlers were designed to look like security scanners. However, they were stuffed with intentional fake detections for all sorts of Trojans and Worms. The business model was simple but […]

Read more ...

These domains are associated with the Win32/FakeRean “Fake anti-virus” trojan, and are worth blocking. Domain IP laxesepaweno.com 50.23.83.40 fugegewulevu.com 50.23.83.41 tepucazij.com 50.23.83.42 cuhucupivu.com 50.23.84.216 sirakapofeti.com 50.23.84.217 zenevakyfa.com 50.23.84.218 tuwynaropotit.com 50.23.193.236 cikipihigilani.com 50.23.193.237 pifajeniwyt.com 50.23.193.238 wumytaxuboly.com 50.23.200.56 tevisuwapucumu.com 76.73.85.251 jicylegavade.com 76.73.85.252 dolagomosu.com 85.17.239.191 bumucewafypevy.com 85.17.239.192 xaqygacatewuk.com 85.17.239.198 mysupigaqyme.com 173.193.196.178 zypomamuzosa.com 173.249.145.53 nylujusofo.com 173.249.145.54 qajivehucewupo.com 173.249.145.55 wyduzylys.com […]

Read more ...

When my colleague Fabio wrote about a Rogueware campaign targeting MAC users, I investigated a bit into the origin of these campaigns. It was interesting how different researchers were getting those samples through searching images on Google. However, different searches always arrive at the same result, leading to the question: How many search terms have […]

Read more ...


Categories

WEDNESDAY, MAY 08, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments