- Ad-Aware Free Antivirus+
- Ad-Aware Personal Security
- Ad-Aware Pro Security
- Ad-Aware Total Security
- Ad-Aware Business Security
- PC Tuneup
- Data Security
- Trial Center
- Security Center
- English ▾
- Contact Us
Rogue security software, often referred to as scareware, is one of the biggest challenges that computer users are faced with right now. Taking the form of legitimate-looking anti-virus, anti-spyware and anti-malware products, these rogue applications look to be beneficial from a security perspective but provide little or no security, generate misleading alerts, or attempt to lure users into participating in fraudulent transactions - blurring the lines between genuine software and applications that put you in harm’s way.
In order to help you clearly see what programs are considered rogue – and avoid them – Lavasoft Malware Labs is proud to introduce a brand new site: the Rogue Gallery.
Today, November 30, is known as Cyber Monday and it marks the kickoff of the online shopping season. If you’re a savvy shopper, scouring the Web to find the best deals and bargains today, make sure to keep this in mind: Cyber Monday will also bring with it an upswing in cyber scams. In fact, our security analysts at the Malware Labs at Lavasoft have already reported a 390 percent increase in the amount of malware detected and added to Ad-Aware's threat database, compared to the same period last year.
RESpyWare is yet another clone of the now so common WiniGuard family.
REAnti is yet another clone of WiniGuard. This one comes with the same GUI (graphic user interface) as previous ones like KeppCop, SecureKeeper, SiteVillain and AntiAID.
We have an Ad-Aware update that we’d like to call your attention to today. About one year ago, we added a rogue security program called Winiguard into Ad-Aware’s Detection Database, in order to keep you safe from yet another program that peddles itself as legitimate security software in an attempt to exploit computer users. But this story doesn’t end there.
I found a couple of slides from a company internal training session and thought I would share them. It's just to give an example of the kind of work the Lavasoft research team at Malware Labs does.
It describes the binary analysis of a Win32.TrojanDropper.KGen sample, the malware multi-component structure and the payload it implements.
This past week, news broke that British police have made groundbreaking headway in combating cyber crime, making the first arrests in Europe of two people suspected of distributing Zeus – a sophisticated Trojan designed to steal sensitive data. On November 3, the Metropolitan Police’s Central e-Crime Unit arrested a man and a woman in Manchester, England on suspicion of helping spread the Trojan, known as Zeus or Zbot.
The U.S. Federal Bureau of Investigation has issued a new advisory for law firms and PR companies to take heed of:
By way of an ongoing FBI investigation, it’s been found that hackers are increasingly targeting U.S. law firms and public relations groups with spear phishing e-mails containing malicious payloads, in an attempt to break into their computer networks to steal sensitive information.
According to the FBI’s e-scam advisory:
You may have seen our blog post last week giving you a look at the new Ad-Aware Game Edition, the spin-off of Ad-Aware that provides protection to gamers as they play.
Did you know that we also have a video tutorial available on the latest version of Ad-Aware? Have a look below to get a good, brief overview of Ad-Aware Internet Security.
- 1 of 2