- Ad-Aware Free Antivirus+
- Ad-Aware Personal Security
- Ad-Aware Pro Security
- Ad-Aware Total Security
- Ad-Aware Web Companion
- PC Tuneup
- Data Security
- Trial Center
- Security Center
- English ▾
- Contact Us
Changes in version 11.0.3566.0:
1. Updater changed: no custom install page (the option for changing installation folder is on the first installation page now), Ad-Aware Safe Browsing Add-On checkboxes are on the second installation page (if no Ad-Aware toolbar is detected), PasswordBox installation is added on the third installation page.
2. Download Report link is available within Scanned Report Details table. It enables users to download detailed information about each scan in a separate file on computer.
The first beta for the new version of AdAware 11 is now available! We're counting on you to give us your feedback, iron out the kinks and help us to create the best product possible.
We are looking for both experienced AdAware users and newbies who may be seeing the product for the first time. We're limiting the amount of beta testers for the initial test period so if you don't get to test AdAware 11 straight away, you'll get a chance soon.
Microsoft have published a Security Bulletin Summary for August 2012. A number of updates have been released including five "critical" and four "important" severity updates affecting Windows, Internet Explorer, Microsoft Office, Microsoft Developer Tools, Microsoft Server Software, SQL Server and Microsoft Exchange.
The patches address remote code execution and elevation of privilege. Importantly, an update has been released to patch four vulnerabilities in Internet Explorer 6, 7, 8 and 9 (MS12-052).
Adobe have published a security update addressing a critical vulnerability in Adobe Flash Player 184.108.40.206 and earlier versions.
The vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.
Windows users of Adobe Flash Player 220.127.116.11 and earlier are advised to upgrade to Adobe Flash Player 11.3.300.257
Hot on the heels of the LinkedIn password breach, dating site, eHarmony have reported that "a small fraction" (about 1.5 million) of their user base have also been affected. Like LinkedIn, eHarmony have reset the compromised account's passwords and will send out notification explaining how to reset them. Probably a good time to change your password - check the best practices in the LinkedIn post from earlier today.
LinkedIn have confirmed that a number of user accounts have been compromised. While they have not published the amount of compromised accounts, a Russian forum user uploaded around 6.5 million encrypted user passwords to demonstrate the security breach took place. While the user names have not been included, it's a pretty good bet that they have also been stolen. You can check this site to see if your password was amongst those stolen.
On 28th May 2012, Iran National CERT published a report describing a new and complex threat dubbed “Flame” that was thought to be responsible for incidents of “mass data loss in Iran”. The report linked this newly discovered threat with the notorious Stuxnet and Duqu attacks.
Shortly after, the Laboratory of Cryptography and System Security at Budapest University of Technology and Economics published a report describing an apparently identical threat that may have been active “for as long as five to eight years”.
According to the U.S. Federal Trade Commission's (FTC) Annual Consumer Sentinel Network Data Book, online fraud cost consumers more than $1.5 billion in 2011, with identity fraud and identity theft garnering 70 percent of total complaints. With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data. If identity theft hasn't concerned you in the past, it's time to reconsider.
The latest Flash update patches two security vulnerabilities - the first (CVE-2012-0772), resolves a memory corruption vulnerability related to URL security domain checking that could lead to code execution on Windows 7 or Vista. The second (CVE-2012-0773) fixes a memory corruption vulnerability in the NetStream class that could lead to code execution.
TLDR; vulnerable Flash player, exploits patched.
However, this time around, Adobe have introduced an automatic updating mechanism for Flash Player.
In Microsoft's Security Bulletin Summary for February 2012 a number of updates have been released including four "critical" and five "important" severity updates.
Lavasoft has just received a VB100 award from Virus Bulletin ranked among the top applications in the detection chart: http://www.virusbtn.com/vb100/latest_comparative/index. We’re pretty happy!
In a comparative test published in Virus Bulletin’s latest issue, Ad-Aware achieved one of the top results for malware detection. Virus Bulletin independently tests anti-virus products and those products which pass the tests are awarded the VB100. The test review covers a range of criteria, including detection rates, design and usability, and performance.
It's common to hear security vendors advise people to "keep their computer up to date with the latest patches" but what does that actually mean and why is it important?
Malware can infiltrate PCs via a number of attack surfaces, one of which being bugs in Windows and the programs on your PC.
- 1 of 5