64-bit versions of Microsoft’s very own Windows operating system are expected to face a new wave of attacks next year, especially from more advanced malware specifically developed for this type of platform.
A few years ago, I wrote a Blog post about false positive problems that I have in many of my tools, and I received many responses from users and developers that experience the same problem. Today the false positive issues still exist, but it seems that people are more aware to the false positive problems, because I get less complaints about virus alerts in my software than what I have gotten in the past.
Microsoft’s Security Intelligence Report Volume 13 reveals some very interesting figures concerning the currently available versions of Windows 7.
Base Smart Card Cryptographic Service Provider (Base CSP) allows smart card vendors to more easily enable their smart cards on Windows with a lightweight proprietary card module instead of a full proprietary CSP. After you install this item, you may have to restart your computer.
The number of bootkits is steadily growing. All kinds of new bootkits are appearing: sophisticated and simple, serving different purposes (such as rootkits or ransomware Trojans). Malware writers are not above analyzing their competitors’ malicious code.
Given how long 64-bit processors have been on the market, it's a bit surprising to see a vulnerability that takes advantage of AMD's x86-64 instruction set on Intel processors surface this late in the game. The vulnerability was originally thought to be Linux-specific, but was only recently found to be exploitable in Windows, BSD, and potentially OS X.
Some 64-bit operating systems and virtualization software programs are vulnerable to local privilege escalation attacks when running on Intel processors (CPUs), the U.S. Computer Emergency Readiness Team (US-CERT) said in a security advisory on Wednesday.
Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.
St. Petersburg, Russia — May 15, 2012. The dismal Proactive Security Challenge results turned in by the big AV (Anti-Virus) players in the most recent Matousec.com 64-bit Windows 7 tests are making us wonder whether security companies are really catering to the needs of 64-bit PC/OS users. Are traditional AV vendors even capable of delivering reliable and robust protection to these users?
Malwarebytes Corporation has updated its anti-malware tool, Malwarebytes Anti-Malware to version 1.61. The latest build promises 25 percent faster quick scans on Windows 64-bit, plus a number of usability enhancements, greater stability and bug fixes.
Vulnerability Lab researchers identified a high risk memory corruption flaw that affects the 5.6.59.x versions of the popular messaging applications. By exploiting this flaw, an attacker could remotely crash a computer that’s running Windows 7 simply by sending a file from a Linux client.
The video demonstrates PickMeApp functionality by capturing Photoshop CS4 on Windows XP 32Bit and re-installing the application on Windows 7 64Bit
The newest build for Zemana AntiLogger, one of the best solutions against all sorts of logging, brings to the table repairs that affected all available modules.
A hacker known as w3bd3vil posted a message on Twitter a couple of days ago claiming that he found a vulnerability in the 64-bit version of Windows 7 that could be taken advantage of using Apple’s popular web browser Safari.
Page 2 of 3