now hiring
Come Join our Team!

Naples Computers is looking for Qualified Support Technicians.

On the job Training and more.


New attack bypasses EVERY Windows security product

Are you a Windows user? Do you make sure that your antivirus program is updated regularly? Do you feel safe? You shouldn’t! Read on to find out why …


Read More

Security researchers at have come up with an ingenious attack that can bypass every Windowssecurity product tested and allow malicious code to make its way to your system. 

Yes, you read that right - every Windows security product tested. And the list is both huge and sobering: 

* 3D EQSecure Professional Edition 4.2
* avast! Internet Security 5.0.462
* AVG Internet Security 9.0.791
* Avira Premium Security Suite
* BitDefender Total Security 2010
* Blink Professional 4.6.1
* CA Internet Security Suite Plus 2010
* Comodo Internet Security Free 4.0.138377.779
* DefenseWall Personal Firewall 3.00
* Dr.Web Security Space Pro
* ESET Smart Security
* F-Secure Internet Security 2010 10.00 build 246
* G DATA TotalCare 2010
* Kaspersky Internet Security 2010
* KingSoft Personal Firewall 9 Plus 2009.05.07.70
* Malware Defender 2.6.0
* McAfee Total Protection 2010 10.0.580
* Norman Security Suite PRO 8.0
Norton Internet Security 2010
* Online Armor Premium
* Online Solutions Security Suite 1.5.14905.0
* Outpost Security Suite Pro
* Outpost Security Suite Pro 7.0.3330.505.1221 BETA VERSION
* Panda Internet Security 2010 15.01.00
* PC Tools Firewall Plus
* PrivateFirewall
* Security Shield 2010
* Sophos Endpoint Security and Control 9.0.5
* ThreatFire
* Trend Micro Internet Security Pro 2010 17.50.1647.0000
* Vba32 Personal
* VIPRE Antivirus Premium 4.0.3272
* VirusBuster Internet Security Suite 3.2
* Webroot Internet Security Essentials
* ZoneAlarm Extreme Security 9.1.507.000
* probably other versions of above mentioned software
* possibly many other software products that use kernel hooks to implement security features 

The attack is a clever “bait-and-switch” style move. Harmless code is passed to the security software for scanning, but as soon as it’s given the green light, it’s swapped for the malicious code. The attack works even more reliably on multi-core systems because one thread doesn’t keep an eye on other threads that are running simultaneously, making the switch easier. 

The attack, called KHOBE (Kernel HOok Bypassing Engine), leverages a Windows module called the System Service Descriptor Table, or SSDT, which is hooked up to the Windows kernel. Unfortunately, SSDT is utilized by antivirus software.
София EMSIEN-3