article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. APT41’s activities span from the mid-2000s to the present day. When I first scanned Anvisoft at Virustotal.com back in 2012, none of the antivirus products detected it as suspicious or malicious. Image: FBI.

Antivirus 360
article thumbnail

4 Best Antivirus Software of 2021

eSecurity Planet

What’s the best antivirus software? With the rise in malware and ransomware and a growing reliance on the internet, antivirus solutions are critical for protecting your data and applications. Top 4 antivirus software. Virtual private network ( VPN ). Bitdefender. Other AV contenders. Bitdefender Total Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bitdefender Review: EDR and Antivirus Security Solutions

eSecurity Planet

Enterprise antivirus software helps keep confidential enterprise data as secure as possible. Bitdefender offers some of the best small-to-midsize business endpoint detection and response (EDR) and consumer antivirus solutions, making our best security product lists for both products. Bitdefender GravityZone Elite features.

article thumbnail

Secure Access for Remote Workers: RDP, VPN & VDI

eSecurity Planet

We use passwords to authenticate our users, run antivirus to keep malware off our endpoints , monitor our networks, and implement firewalls so we can have multiple defenses against attackers. All these technologies can present security challenges, which makes zero trust principles important in any remote access solution.

VPN 120
article thumbnail

GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks

The Last Watchdog

Unsecured Wi-Fi in the home can present a way for criminals to gain access to secure business data. This includes antivirus software, operating systems, and individual apps. You can also invest in a virtual private network (VPN) for use when you are connected to a public network. Cyber hygiene basics.

Risk 203
article thumbnail

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware

Security Affairs

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware. The following schema is an effort to present in a single high-level diagram the workflow of the most popular Latin American trojans. Next, an email template used by Javali to lure victims is presented.

Antivirus 116
article thumbnail

Trusted relationship attacks: trust, but verify

SecureList

Most often, communication between the service provider and the client takes place via VPN connections and Remote Desktop Protocol (RDP) services. With this method, there’s no need to connect to a VPN, but the security risks grow significantly (for example, the possibility of brute-force attacks).

VPN 75