News
3/24/2014
02:28 PM
50%
50%

New Malwarebytes Technology Proactively Protects PCs From Advanced Stealthy Malware

Malwarebytes Anti-Malware Premium will support XP users for life

MARCH 24, 2014: Malwarebytes today announces the launch of Malwarebytes Anti-Malware Premium, a new tool designed to proactively protect home PCs against advanced criminal software which traditional anti-virus cannot detect. In development for over 18 months, Premium is the first completely new version of the company's flagship security software for six years, and is designed to work alongside traditional anti-virus to provide additional protection.

Premium will support XP users for life, who currently make up 20% of Malwarebytes' user-base and could be at greater risk when updates stop on April 8.

The new product brings together five powerful technologies in a lightweight 16MB download for the first time, the combination of which provides dynamic protection from advanced threats. At its core is a new heuristics engine, designed to detect and kill malicious software based on behavior. This means protection is not reliant on slow-moving signatures, providing defense against zero-day attacks.

Malwarebytes Anti-Malware Premium also integrates new Anti-Rootkit technology, which rips out and fixes the damage done by malicious software hiding at an extremely deep-level in the operating system. Malwarebytes' Chameleon is also built-in, allowing Premium to brute force start-up and scan when malware is crippling traditional security software and other processes.

Premium has added updated malicious URL blocking and enhanced protection from unwanted programs such as aggressive adware and toolbars. A new user interface and ultra-quick threat scan, ensure the product is easy to use.

Marcin Kleczynski, Founder and CEO of Malwarebytes, said, "Six years after the launch of the first version, and following 18 months of development and countless research hours, we are thrilled to announce Premium.

"It has been a real labor of love. We are proud of what we have created and believe it builds upon the success of our existing products to give people a strong proactive countermeasure against today's advanced online threats."

The new product does not replace Malwarebytes' acclaimed free clean-up tool, which the company has committed to providing for free forever.

Malwarebytes Anti-Malware Premium is available from the online store for an annual subscription of $24.95, and provides coverage for up to three PCs. Users with existing lifetime licenses for Malwarebytes Anti-Malware PRO will receive a free upgrade to the new product.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company's flagship product, employs a highly advanced behavior-based detection engine that has removed more than 5 billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report