News: Cexx forums, with volunteers dedicated to helping you remove malware and stay protected
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
October 25, 2014, 11:37:45
Pages: 1 2 3 [4] 5 6 7   Go Down
  Print  
Topic: Rogue anti-virus, anti-spyware, scareware, etc...  (Read 48833 times)
0 Members and 1 Guest are viewing this topic.
« Reply #45 on: May 29, 2010, 05:44:13 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Scareware gang busted...
- http://www.darkreading.com/shared/printableArticle.jhtml?articleID=225200545
May 28, 2010 CHICAGO - "An international cybercrime scheme caused Internet users in more than 60 countries to purchase more than one million bogus software products, causing victims to lose more than $100 million, according to a federal indictment returned here against a Cincinnati area man and two other men believed to be living abroad... fake advertisements placed on various legitimate companies' websites, deceived Internet users into falsely believing that their computers were infected with "malware" or had other critical errors to induce them to purchase "scareware" software products that had limited or no ability to remedy the purported, but nonexistent, defects... Two defendants, Bjorn Daniel Sundin, and Shaileshkumar P. Jain, with others owned and operated Innovative Marketing, Inc. (IM), a company registered in Belize that purported to sell anti-virus and computer performance/repair software through the internet and that operated a subsidiary called Innovative Marketing Ukraine, located in Kiev. The company appeared to close down last year after the U.S. Federal Trade Commission filed a federal lawsuit in Maryland seeking to end the allegedly fraudulent practices... Individuals who believe they are victims and want to receive information about the criminal prosecution may call a toll-free hotline, 866-364-2621, ext. 1, for periodic updates... Each count of wire fraud carries a maximum penalty of 20 years in prison and a $250,000 fine and restitution is mandatory. The Court may also impose a fine totaling twice the loss to any victim or twice the gain to the defendant, whichever is greater..."

- http://chicago.fbi.gov/dojpressrel/pressrel10/cg052710.htm
May 27, 2010

.
« Last Edit: May 29, 2010, 07:19:47 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #46 on: July 14, 2010, 15:52:40 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Exploits, malware, and scareware courtesy of AS6851, BKCNET, Sagade Ltd.
- http://ddanchev.blogspot.com/2010/07/exploits-malware-and-scareware-courtesy.html
July 14, 2010 - "Never trust an AS whose abuse-mailbox is using a Gmail account (piotrek89@gmail.com), and in particular one that you've come across to during several malware campaigns over the past couple of months. It's AS6851, BKCNET "SIA" IZZI* I'm referring to, also known as Sagade Ltd... It's the Koobface gang connection in the face of urodinam .net, which is also hosted within AS6851, currently responding to 91.188.59.10... Currently active exploits/malware/scareware serving domain portfolios within AS6851: Parked at/responding to 85.234.190.15... Parked at/responding to 85.234.190.4... Parked at/responding to 91.188.60.225... Parked at/responding to 91.188.60.3... Parked at/responding to 91.188.59.74... Parked at/responding to 85.234.190.16... Detection rates for the currently active malware samples, including the HOSTS file modifications on infected hosts, for the purpose of redirecting users to cybercrime-friendly search engines, monetized through traffic trading affiliate programs:
- 78490.jar  - Result: 0/42 (0%)
- ad3.exe - Result: 41/42 (97.62%)
- a-fast.exe - Result: 36/42 (85.72%)
- dm.exe - Result: 37/42 (88.1%)
- iv.exe - Result: 8/42 (19.05%)
- j2_t895.jar - Result: 0/42 (0%)
- movie.exe - Result: 40/42 (95.24%)
- tst.exe - Result: 35/42 (83.34%)
- wsc.exe - Result: 37/42 (88.1%) - HOSTS file modification ...
- rc.exe - Result: 41/42 (97.62%) - HOSTS file modification ...
- installer.0028.exe - Result: 9/42 (21.43%) - HOSTS file modification ...
- installer.0022.exe  - Result: 9/42 (21.43%) - HOSTS file modification ..."
(More detail and links at the ddanchev blog URL above.)

* http://cidr-report.org/cgi-bin/as-report?as=AS6851

- http://google.com/safebrowsing/diagnostic?site=AS:6851
"Of the 1035 site(s) we tested on this network over the past 90 days, 33 site(s)... served content that resulted in malicious software being downloaded and installed without user consent... last time Google tested a site on this network was on 2010-07-15, and the last time suspicious content was found was on 2010-07-15.
Over the past 90 days, we found 50 site(s) on this network... that appeared to function as intermediaries for the infection of 2661 other site(s)... this network has hosted sites that have distributed malicious software in the past 90 days. We found 550 site(s)... that infected 16759 other site(s)..."

 Evil or Very Mad Evil or Very Mad Evil or Very Mad
« Last Edit: July 15, 2010, 05:20:00 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #47 on: July 30, 2010, 08:57:05 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Fake Firefox update leads to scareware...
- http://www.theregister.co.uk/2010/07/30/firefox_update_scareware_ruse/
30 July 2010 - "... Prospective marks are normally lured to these sites through search engine manipulation, which ensures rogue sites appear prominently in lists of search results for newsworthy terms... write-up of the scareware slinging ruse in a blog post here*..."

* http://www.f-secure.com/weblog/archives/00001997.html
"...  rogue peddlers have gotten tired of their old tricks in pushing rogueware into the user's system. It used to be a fake scanning page, that leads to a warning, then a fake AV. Now, it comes as the Firefox "Just Updated" page... the user doesn't need to click anything, the download dialog box immediately appears as soon as the page loads... When the user runs the file... Bad old rogue AV..."

(Screenshots available at the F-secure URL above.)

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #48 on: September 18, 2010, 08:47:21 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue AV - social engineering...
- http://www.symantec.com/connect/blogs/latest-and-most-convincing-rogue-av-social-engineering
Sep 17, 2010 - "The success and penetration of fraudulent security software depends on its ability to scare the user into buying a fake security product. Over the years we have seen that many social engineering techniques have evolved in attempts to achieve this... This technique is employed by a recently found, in-the-wild sample of fake security software that misleads users by claiming to be a legitimate “Microsoft Security Essential.” The real social engineering is not found in the name, but in how it works (step by step) to trick users into buying this unknown security product... rather than showing many fake detection results, as is usually the case with rogue antivirus software, it reports just one threat. It will always report the same file (c:\windows\system32\cmd.exe) as “Unknown  Win32/Trojan” and will request that the user clicks on “Apply actions.” However, both of the “Apply actions” and “Clean computer” buttons will redirect users to scan the identified threat with online scanners. Then, it shows a fake online scanner window that includes almost all reputable antivirus products, including Symantec, along with five unknown products... we may see the same or some variation of this rogue software being adopted across a few of the other rogueware families..."

- http://blog.webroot.com/2010/09/16/new-rogue-is-actually-five-rogues-in-one/
September 16, 2010

(Screenshots and more detail at both URLs above.)

 Evil or Very Mad
« Last Edit: September 20, 2010, 07:56:34 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #49 on: October 11, 2010, 12:56:08 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

BlackHat SEO campaign used to spread rogue...
- http://blog.urlvoid.com/blackhat-seo-campaign-used-to-spread-smart-engine/
October 9, 2010 - "A new blackhat seo campaign is distributing the setup installer of the new rogue security software named Smart Engine. The spreading status looks like to be pretty aggressive, we have logged more than 2000 infected websites that are used to capture popular keywords and to redirect users to malicious urls or other fake scanner pages, with the intent to install the rogue software installer. When an user clicks on an infected url, there is a redirection... "

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #50 on: January 05, 2011, 09:37:59 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue variant number stable, new “utility” look appears
- http://sunbeltblog.blogspot.com/2011/01/rogues-in-2010-number-of-variants.html
January 05, 2011 - "GFI Labs documented 167 rogue security products in 2010 – exactly the same number as 2009... the number of rogue security products appearing annually has been stable for the last three years. After increasing from 26 in 2005 to 162 in 2008, we’ve seen about the same number of variants each year since: 167 in both 2009 and 2010... Late in 2010 Researchers at GFI Labs noticed that at least one group of rogue writers had started a new deceptive tactic: creating graphic interfaces that impersonated utility software - such as hard drive defragmentation applications - instead of anti-virus products...
FakeAV-Defrag family history:
11/15/2010        Ultra Defragger
11/16/2010        ScanDisk-Defragger
11/30/2010        WinHDD
12/9/2010          HDDPlus
12/12/2010        HDDRescue
12/12/2010        HDDRepair
12/13/2010        HDDDiagnostic ...
Rogue distributors usually create their malicious software and server infrastructure then clone their malcode often in order to escape detection by legitimate anti-virus products. They count on making money in the days (or hours) that the new rogue clones go undetected..."
(Charts available at the Sunbelt blog URL above.)

 Evil or Very Mad Questioning or Suspicious
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #51 on: February 01, 2011, 15:30:14 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue AVG AV on the Web...
- http://www.f-secure.com/weblog/archives/00002090.html
January 31, 2011 - "... A rogue* was recently discovered to be using AVG's logo and reputable name, hoping to mislead and trick people into purchasing the fake AV... Aside from AVG's logo, the rogue's interface bears no resemblance to that of the legit AVG Anti-Virus Free Edition 2011... However, users who aren't familiar with the product might not notice this difference and think that they are getting the real thing. One bit of advice — watch out for the source. Most antivirus companies provide free/trial versions of their products directly on their websites... skip the untrustworthy channel and get it directly from the AV vendors." **
(Screenshots of the rogue available at the URL above, and the blogs.technet URL below.)

* http://www.f-secure.com/v-descs/rogue_w32_rogue_antispyware.shtml

** [In this case, AVG Free legit site is: http://free.avg.com/ ]

> http://blogs.technet.com/b/mmpc/archive/2011/02/01/fakexpa_5f00_raises_5f00_a_5f00_few_5f00_brows.aspx
31 Jan 2011 6:05 PM

 Evil or Very Mad Shocked
« Last Edit: February 01, 2011, 18:21:10 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #52 on: February 21, 2011, 13:17:11 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Fake Avira rogue...
- http://techblog.avira.com/2011/02/21/malware-signed-with-fake-avira-certificate/en/
February 21, 2011 - "... Viewing the properties of the digital signature, Microsoft Windows shows a note “A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider”. Don’t misunderstand that message – it means that this certificate is not created by Avira GmbH and therefore it’s not a stolen certificate. Stuxnet gained a lot of attention by the media because it contained a valid digital signature from “Realtek Semiconductor” which was obviously stolen by the malware authors... The malware itself is nothing new. It’s a member of the well known Zbot/ZeuS malware family which is spammed via Email. The Trojan doesn’t show new behavior of the Zbot/ZeuS authors. Upon execution it is creating a copy of itself and is deleting the original executed file; also it adds a runkey to the Windows registry in order to get started after a reboot. After this the Trojan tries to connect to the C&C Server “**ciq.net” to receive more information about targets to spy upon..."

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #53 on: March 03, 2011, 01:53:55 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue AV different on each browser...
- http://research.zscaler.com/2011/03/new-fake-av-page-uses-firefox-internals.html
March 2, 2011 - "... new type of Fake AV page that looks different on each browser . And it also uses internal elements of those browsers... The malicious executable InstallInternetDefender_722.exe is detected* by only 9.5% of AV!... The version displayed in Firefox... looks like the security warning Firefox shows for malicious and phishing sites... the Chrome version looks like a legitimate browser warning... For Safari, only the first popup box is tailored to the browser. The main page is the same as Internet Explorer..."
(Screenshots and more detail available at the URL above.)
* http://www.virustotal.com/file-scan/report.html?id=a52344814b68b7d3a3cdd5b7fb4f73f4b4b98e0caeed9c8c85ad52ff2e05e1ce-1299087679
File name: InstallInternetDefender_722.exe
Submission date: 2011-03-02 17:41:19 (UTC)
Result: 4/42 (9.5%)
There is a more up-to-date report...
- http://www.virustotal.com/file-scan/report.html?id=a52344814b68b7d3a3cdd5b7fb4f73f4b4b98e0caeed9c8c85ad52ff2e05e1ce-1299190654
File name: install_internetdefender.exe
Submission date: 2011-03-03 22:17:34 (UTC)
Result: 12/43 (27.9%)

 Evil or Very Mad
« Last Edit: March 04, 2011, 07:36:13 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #54 on: March 03, 2011, 15:58:32 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

ChronoPay scareware...
- http://krebsonsecurity.com/2011/03/chronopays-scareware-diaries/
March 3, 2011 - "If your Windows PC has been hijacked by fake anti-virus software or “scareware” anytime in the past few years, chances are good that the attack was made possible by ChronoPay, Russia’s largest processor of online payments... ChronoPay also specializes in processing the transactions of so-called “high-risk” industries, including online pharmacies, tobacco sales, donut and software sales. A business is generally classified as high-risk when there is a great potential for credit card chargebacks and a fair chance that it will shut down or vanish without warning... ChronoPay, lists more than 75 pages of credit card transactions that the company processed from Americans who paid anywhere from $50 to $150 to rid their computers of imaginary threats found by scareware from creativity-soft .com... As security firm F-Secure noted* at the time, victims of this scam were informed that an “antipiracy foundation scanner” had found illegal torrents from the victim’s system, and those who refused to pay $400 via a credit card transaction could face jail time and huge fines..."
* http://www.f-secure.com/weblog/archives/00001931.html

- http://www.f-secure.com/weblog/archives/00002112.html
March 4, 2011

 Evil or Very Mad
« Last Edit: March 04, 2011, 14:53:02 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #55 on: March 14, 2011, 02:07:49 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue AV links from tsunami in Japan...
- http://isc.sans.edu/diary.html?storyid=10543
Last Updated: 2011-03-14 08:21:18 UTC - "... people are still surprised how quickly bad guys catch up with events in the real world - this is especially true for the RogueAV/FakeAV groups which constantly poison search engines in order to lure people into installing their malware. We can also see even many AV vendors warning people to be careful when they search for this or that (currently, obviously the search query that generates most attention is related to the disaster in Japan). While it is good to constantly raise awareness and warn people about what’s happening, one important thing to know is that the RogueAV/FakeAV guys poison search engines and modify their scripts automatically. This means that they are constantly on top of current trends and events in the world – whatever happens, their scripts will make sure that they “contain” the latest data/information about it... With the disaster in Japan striking on Friday we saw another RogueAV/FakeAV group heavily poisoning the search engines – even Google which normally removes them quickly still contains hundreds of thousands of such pages. Since this campaign can be easily identified, here is... the current count... 1.7 million pages (!!!). Keep in mind that there are multiple pages listed here with different search terms (they modify search terms through a single parameter), but the number is still staggering. According to Google, in past 24 hours there have been 14,200 such pages added so it’s clear that the bad guys are very active... the RogueAV/FakeAV guys can create very realistic pages that can, unfortunately as we’ve all witnessed, successfully poison search engines."

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #56 on: April 19, 2011, 05:16:07 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Rogue AV - Easter cards...
- http://sunbeltblog.blogspot.com/2011/04/easter-cards-more-rogue-av.html
April 19, 2011 - "Looks like we have more shenanigans involving rogue AV products and Easter... Elsewhere there are malicious emails* doing the rounds - the Easter scams are in full swing..."
* http://www.net-security.org/malware_news.php?id=1698

(Screenshots available at both URLs above.)

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #57 on: May 12, 2011, 09:17:15 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Google doodle leads to scareware...
- http://www.h-online.com/security/news/item/Google-doodle-takes-you-to-scareware-sites-1242208.html
12 May 2011 - "... it is rare for a click on a prominently positioned Google doodle to take you to links for fake virus scans... If a user clicks on the doodle to find out what it means, Google launches a search for the term the doodle refers to... On Wednesday, Google celebrated the 117th birthday of dance icon Martha Graham. Clicking on the doodle displayed a list of preview images of the modern art dancer, some of which were links to a scareware site... At present, a search for Martha Graham on Google still displays those images. Once on the scareware site the user is then offered the SecurityScanner.exe file for download in order to solve the alleged virus problem; the file contains malware. Only 4 of the 42 scanners used by Virustotal flagged the file as being a threat at 11am on Wednesday. A test conducted by The H's associates at heise Security revealed that the scareware managed to infect a Windows 7 system with Microsoft Security Essentials 2 (MSE2) enabled. The malware disabled MSE2 and added itself to the security centre as "Win 7 Home Security 2011" – and labelled itself as disabled. Users are then asked to pay €60 to activate it.
The infected system could no longer be used in any meaningful way. Warnings constantly popped up whenever any web page was visited regardless of which browser was used. The program does not appear on the list of installed software and therefore cannot be uninstalled easily. In similar cases, scareware could, with a lot of effort, be manually removed, but this software changed so many settings in the system that reinstalling Windows was the safest solution."
___

- http://blog.stopbadware.org/2011/04/29/fake-av-a-royal-wedding-present
2011.04.29 - "... we have no reason to believe the site’s legitimate owners intended for this URL to exist. Rather, an attacker appears to have exploited a weakness in the site’s security model and inserted a -redirect- for the URL... the payload from this attack can be extremely annoying and costly — it makes the PC all but unusable — this sort of attack is certainly not of the most sophisticated or technically dangerous variety. A user who does -not- download or run the Fake AV executable does not appear to suffer compromise..."
> http://www.virustotal.com/file-scan/report.html?id=153b6cd95b6c2847bf03e4df91225babd70c74de08ee39d64d216707176b884b-1304097780
File name: SecurityScanner.exe
Submission date: 2011-04-29 17:23:00 (UTC)
Result: 4/42 (9.5%)
There is a more up-to-date report ...
- http://www.virustotal.com/file-scan/report.html?id=153b6cd95b6c2847bf03e4df91225babd70c74de08ee39d64d216707176b884b-1305388325
File name: 7978e13ab11b027fb22b6cb4ec16dd3f
Submission date: 2011-05-14 15:52:05 (UTC)
Result: 32/43 (74.4%)

 Sad  Evil or Very Mad
« Last Edit: May 22, 2011, 11:13:18 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #58 on: May 17, 2011, 04:59:37 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Scareware fakes HD failures...
- http://www.symantec.com/connect/fr/blogs/trojan-feigns-failures-increase-rogue-defragger-sales
16 May 2011 - "... Hard disk failures are a fact of life... Trojan.FakeAV writers are aware of this, and the end of last year saw a move by some into the creation of fake hard disk scanners and defragmentation tools... Trojan.Fakefrag. What sets this apart from standard fake disk cleanup utilities is that the Trojan makes changes on the computer and displays messages that make it appear as though the hard disk is failing. Then it drops a member of the UltraDefragger family called Windows Recovery, which offers to repair these disk errors for a mere $79.50!...
• It fakes hardware failure messages...
• It moves all the files in the "All Users" folder to a temporary location and hides files in the "Current User" folder. This makes it look like you have lost all the files on your desktop.
• It stops you from changing your background image.
• It disables the Task Manager.
• It sets both the “HideIcons” and “Superhidden” registry entries to give the impression that more icons have been deleted.
... the failure messages look just like something Windows would display..."
(Screenshots, video, and more detail available at the Symantec URL above.)
___

New scareware - charted
- http://blogs.mcafee.com/wp-content/uploads/2011/05/FP_BLOG_110513_2.jpg
May 13, 2011

 Evil or Very Mad Evil or Very Mad
« Last Edit: May 18, 2011, 06:41:58 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #59 on: May 18, 2011, 20:01:51 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8352



FYI...

Fake AV bingo - 165 domains of bad
- http://isc.sans.org/diary.html?storyid=10894
Last Updated: 2011-05-19 00:06:54 UTC ...(Version: 2) - "Can you guess which domains the crooks behind the Fake Anti-Virus Scam are going to use next ? Well, neither can we. But for several weeks now, they are hosting a lot of their bad stuff out of 91.213.29.66, geo-located in... Russia... all in all 165 domains of badness.
Several of these domains were "found" by our readers via the poisoned Google image searches* that we reported earlier this month, and also via malicious advertisements embedded in perfectly benign web pages...
Fake AV has made its appearance on Macs**, where naive automatic download-and-run default settings in browsers still are common, and where "MacDefender" and its expected numerous successors and variants are likely to become as "successful" for the bad guys as their Windows version has been for years..."
* http://isc.sans.edu/diary.html?storyid=10822
2011-05-04
** http://isc.sans.edu/diary.html?storyid=10813
2011-05-02

 Sad Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
 
Pages: 1 2 3 [4] 5 6 7   Go Up
  Print  
 
Jump to:  

Powered by SMF 1.1.20 | SMF © 2013, Simple Machines Page created in 1.585 seconds with 20 queries.