Отправляет email-рассылки с помощью сервиса Sendsay
  Все выпуски  

Emsisoft Special Easter Offer


Антивирусный "хостинг"

Клуб пользователей антивирусных услуг (Saas, Cloud)

добавить на Яндекс
Антивирусы и безопасность (SaaS, Cloud ...)
av-host.net

Emsisoft Special Easter Offer
2014-04-18 03:32

KMM поделился ссылкой

Emsisoft Special Easter Offer

Easter here we come! We’ve been told Thursday is the unofficial beginning of the weekend. Whether you’re sticking around or taking advantage of the bank holiday with friends, this year’s Emsisoft Easter holiday offer has arrived to brighten up your Spring.

Grab 5 marvelous Emsisoft Easter Eggs while they last!

The Emsisoft Easter Celebration 2014 starts tonight and will be more exciting than ever. We’ve got not 1 but 5 really awesome deals we’d love to share with you. And: all of them can be combined in the same basket, so scan below for what’s new and be sure not to miss out!

‘Cause you know the tricky thing about Easter is that there is only a limited amount of eggs available (first come first serve!) and usually no leftovers after the holiday ;)

One deal is not enough.

For every purchase or renewal of Emsisoft Anti-Malware (1 year or more) between April 18th and April 23rd, 2014 on our website, you’ll get the following upgrades at a special discounted rate:

emsisoft_eggs

 

Egg 1: Emsisoft Emergency USB flash drive (4GB) for only US$ 5.00   (was 9.95)

 

Egg 2:  Box Delivery additional to Download for only US$ 5.00   (was 9.95)

 

Egg 3: Emsisoft Mobile Security for only US$ 5.00   (was 19.95)

 

Egg 4: Emsisoft Online Armor for only US$ 5.00   (was 39.95)

 

Egg 5: Genie Timeline Backup for only US$ 5.00   (was 39.95)

 

banner_700x100-en

Hurry up: We only have a limited amount of eggs in the nest!

As it is really hard to choose between so many amazing offers, we also decided to make them stackable. You can grab all 5 deals or just 1, it’s really up to you. Simply add the “Egg” to your basket…erm…cart during checkout.

For renewals, please open Emsisoft Anti-Malware on your computer, go to Settings -> License, and click the “Renew” button.



Watch out for iBanking Android Rogue on Facebook
2014-04-18 03:35

KMM поделился ссылкой

Watch out for iBanking Android Rogue on Facebook

arogMalware has gone mobile, and now it’s getting social too.

A new one-two punch combination uses a malicious Javascript web injection on Facebook to try to fool users into downloading the iBanking rogue app onto their Android device.

How to Avoid Infection

First thing’s first: If you log onto Facebook on your computer and are mysteriously prompted to download a “unique software tool for safe and secure authentication” onto your Android device, do not proceed.

If this occurs, your computer has already been infected and downloading the software will infect your Android device as well. In the event that you are seeing such a prompt, we’d encourage you to seek help at our Help My PC is Infected! support forum. Malware removal is free, even if you are not an Emsisoft customer yet.

iBanking Play-by-Play

The prompt to download a “unique software tool” uses social engineering to try to trick Facebook users into downloading a supposed security app that enables two-factor authentication for their Facebook account. In reality, this “security app” is iBanking, an Android malware that can:

  • Intercept real two factor authentication codes sent by real service providers
  • Capture any incoming/outgoing SMS text
  • Redirect outgoing calls to a pre-programmed phone number
  • Capture audio by activating microphone
  • Steal metadata – call log and contacts list

In the past, iBanking has typically targeted financial websites, using the same malicious Javascript inject technique to attempt to fool users into download. Typically, the form asks for a user’s phone number and device type, and then sends a download link directly to the device in an SMS message. From there, the malicious downloader contains detailed installation instructions, even showing users how to Enable App Installation from Unknown Sources in the Android settings.

iBanking first achieved notoriety back in February, when its source code was leaked on an underground forum, making it widely available to malware authors around the world. Though the malware’s fundamental strategy – infect through web injection and then monitor mobile device activity – is nothing original, its recent appearance on Facebook is a new development and cause for some concern. Simply put: it is much easier and much more cost effective to target a social media website used by billions than it is to target a handful of banking sites that any given user may or may not use. Additionally, the malicious web injection could very easily be confused with a real request to enable two-factor authentication, especially by users who might have been made a tad paranoid about their personal security by the recent Heartbleed crisis.

Protecting Yourself from iBanking

Emsisoft Mobile Security detects the iBanking malware as Android.Trojan.SMSSend.HM (B).
SHA-1: fc13dc7a4562b9e52a8dff14f712f2d07e47def4

Additionally, our Behavior Blocking technology is designed to stop malicious Javascript injects like the one that propagates iBanking before they infect your computer.

How’s that for a one-two punch?

Have a Great (Mobile-Malware) Free Day!



В избранное