Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Archive

Archive for February, 2010
February 18th, 2010

Ads poisoning – JS:Prontexi

The malware usually spreads through web infection placed on innocent, badly secured websites. The ad infiltration method is growing in popularity alongside with the website infections. Now we are facing probably the biggest ad poisoning ever made – all important ad services are affected. It means that users might get infected just by reading their favorite newspaper or by doing search on famous web indexers. User interaction is not needed in this attack – infection begins just after poisoned ad is loaded by the browser – it is not a type of social engineering. We named the source of this attack JS:Prontexi – JavaScript code which initiates infection on victims computer using various vulnerabilities including latest PDF exploits.

Read more…

Categories: analyses, Virus Lab Tags: , ,
February 11th, 2010

avast! 5 small business console, part 1

Although you haven’t heard much about it so far, we are working on an all-new version of network management tool for small businesses – (for now) named the “Small Business Console” (SBC). This post will give you some insight on what you can expect (more posts on the subject will follow soon). Read more…

Categories: Uncategorized Tags:
February 10th, 2010

Is George Clooney getting an Oscar this year?

Honestly, I don’t know, but according to my tastes he shouldn’t get it for his latest movie, it was a bit boring. I was commenting on it to a colleague, and because it’s late night here I wasn’t able to remember the movie name; I just remembered that George Clooney was nominated for leading actor Oscar for this movie. So I simply put “clooney oscar” in my Firefox address bar, which is the simplest way to get the search results for Google. But I wasn’t exactly “Feeling lucky” about the result I got. Read more…

Categories: analyses, Virus Lab Tags:
February 9th, 2010

Human exploiting

In this time, most of all new computers are sold with Windows 7 64bit. This new operation system and new processor features (DEP + ASLR) makes exploiting more difficult. Easier way how to run attacker’s code on victim computer is to convince users to download it voluntarily. Last week we received one interesting example. Let see it… Read more…

Categories: analyses, Virus Lab Tags:
February 9th, 2010

How to Get Help with Version 5

We have noticed that many people are posting technical or sales questions as blog comments. While we really want to help everyone, it is difficult to do it through the blog. So please, if you have questions about the product or sales, you can get much quicker and better assistance through our support center and forums.

  • support.avast.com -– the support page should be your first stop with any avast! questions. It contains already prepared answers to the most commonly asked questions: how to install avast!, inserting the license key, and combining avast! with other security programs. The support page is the place to register and submit tickets directly to us for your technical and licensing issues.
  • forum.avast.com –- avast! support forum is the place where you can find more detailed information about avast! and discuss your issues with developers and other avast! users. This is the place for information about virus removal, infected scripts in websites and features in the new 5.0.
February 4th, 2010

Avast 5 is here. But wait, what about ADNM and the other stuff?

Two weeks ago, we released the new avast 5. Although there were some minor hiccups in the beginning, I’d say it was a fairly successful launch, and the number of avast 5 users is now quickly growing – even though we haven’t really started the official upgrade campaign yet.

As most of you already know, we released 3 new products: avast 5 Free AV, avast 5 Pro AV, and avast 5 Internet Security. However, there seems to be some confusion about what will happen with the other editions of avast. This article would like to explain the situation in a bit more detail. Read more…

Categories: Uncategorized Tags:
February 4th, 2010

What happened to the automatic actions in the Boot-time scan?

Since the release of avast v5.0, we have heard quite a few times the question “where do I set up the automatic actions for the boot-time scan”? As a matter of fact, we decided to remove this feature from avast 5 and this short post will try to explain why. Read more…

Categories: Uncategorized Tags:
February 3rd, 2010

“ILOVEYOU” again! Or not?

Javascript or HTML encryption/obfuscation “may” help to protect web designer’s work from stealing their know-how. But this statement is very controversial – obfuscation or encryption mainly belongs to malicious scripts.  Such a technique may fool automatic antivirus scanners, but anyone can look under the obfuscation because the decryption script is usually distributed alongside with the script itself.  We have released today the detection for very strange script we’ve found yesterday, it’s name was JS:LoverCrypt-A [Trj].

Read more…

Categories: analyses, Virus Lab Tags: