The Lunarsoft Forums are offline while upgrading to the latest version. We will have updates posted on our Facebook feed as to everything that is happening. Feel free to Like and follow what's happening at the Lunarsoft Facebook page.
This post will also be updated once the upgrade has successfully finished.
The forums have been successfully updated. Enjoy!
Recently Support.com acquired SUPERAntiSpyware for a healthy sum of $8.5 million. The deal is expected to finalize by the end of the year. SUPERAntiSpyware is a free tool that is extremely useful when cleaning up a system. It’s offered in both paid and free versions, but for most the free product delivers as promised.
What many people don’t know is that SUPERAntiSpyware, headquartered in Eugene, Oregon, is developed and maintained by a staff of ten. Those ten people, including founder Nick Skrepetos, will join Support.com full-time once the $8.5 million dollar deal is complete.
What changes will this mean for the SUPERAntiSpyware software? That much is unclear at this point in time. It's rumored that the free version will remain as such, free for many to use. However, the pay version will be pushed heavily.
Malwarebytes has certainly been getting a lot of attention from other companies. In 2009, IOBit decided to take advantage of Malwarebytes definition files by implementing them into their own. Malwarebytes quickly caught wind of this and accused Chinese software firm IOBit so reverse engineering it's malware signatures. This of course brought about a lot of commotion and IOBit received a lot of negative press. Thankfully, they finally did the right thing and removed Malwarebytes definitions from their own definitions.
Recently, ChronoPay revealed to security researcher and journalist Brian Krebs that they've hired programmers to reverse engineer the free version of Malwarebytes in an attempt to create their own anti virus solution. Upon learning this to the researcher published screenshots from a ChronoPay internal system showing that they deal with distributing scareware, selling pirated music, running illegal online pharmacies and much more. When confronted about this, ChronoPay released an official statement denying any involvement in the distribution of scareware. "We assure both our customers and competitors that we have no involvement at all with scareware or malware and warn anyone attacking our company with likes and rumor that we will put the full weight of our company behind the appropriate legal response."
ChronoPay may be attempting to find a way of evading the Malwarebytes product since they deal with distributing scareware. Another possibility, is that they're interested in the code to use for one of their own products that they may release in the future. Either way, attempting to reverse engineer someone elses intellectual property without permission is never good news.
The update to the anti-malware engine will be starting with Microsoft Security Essentials and will also update security solutions such as: Forefront Client Security, Forefront Endpoint Protection, and Windows Intune Endpoint Protection.
The new engine version will be in the range of 1.1.700X.0. Aside from the change in the version number no other actual information has been revealed about what changes are being made. However, with the engine receiving an upgrade it is believed that the detection will improve. If this is anything like the last engine upgrade then it may be a little late.
Considering the recent studies have shown that the Microsoft Security Essentials is the most used security solution worldwide, many users will benefit from the engine upgrade. Those studies have shown estimates that over 10.6% of users are running Microsoft Security Essentials. More people are using Microsoft Security Essentials than other free and pay anti-virus solutions. While this may be surprising to some, I definitely must say, "Well done, Microsoft."
By now many of you have heard of LulzSec. You may have heard of their recent activities such as launching DDoS attacks against gaming sites to hacking into government affiliated web sites. They have also been using Twitter to talk about what they’re doing along with cracking a few jokes.
Recently, the group obtained a long list of e-mail addresses and approximately 62,000 passwords. Of these, some of the most common passwords were really to be expected. Some of those common passwords include “123456”, “11111”, “0000”, “1234” and of course “password”.
This should be a good reminder to many people to make sure that they use complex passwords. It’s very helpful to make sure you’re using a strong password while surfing the Internet. This way hackers will not be able to break into your account as easily if you’re using a strong password. If you’re concerned about losing your passwords you may want to try a program called KeePass. For those of you that are wondering KeePass is an open source password manager that stores your passwords in a highly encrypted data base I can only be unlocked with one master password or key.
The royalty free cross platform API for browser based 3D graphics known as WebGL has been found to be insecure and potentially harmful to machines. Apparently WebGL allows other web pages to exploit the browser. WebGL utilizes hardware acceleration and because of more of the user system can be exposed. The reason for that is that WebGL access is the graphics card drivers. So, if there are vulnerabilities that are discovered in graphics cards there isn’t a simple security update the can be run. The driver rules differ from one piece of hardware to the next.
Microsoft Security Response Center Engineering has issued an announcement and support of evidence stating that they cannot endorse the use of WebGL in its current form. They believe that WebGL exposes much more of a user’s system than previously and could result in remote compromise.
Hopefully in the near future WebGL we’ll be able to get these issues sorted out. It would be nice to see something of this nature implemented into browsers. In fact, the stable release is just over three months old. WebGL made its debut March 3, 2011 so it is still very young.