Risk
6/30/2008
03:50 PM
Jake Widman
Jake Widman
Commentary
50%
50%

PC Tools Launches iAntiVirus for Macs

Macworld

PC utility and security vendor PC Tools introduced iAntiVirus, a Mac-specific anti-malware application.The software is designed to be configurable for the optimum balance between speed and thoroughness. It provides real-time protection, alerting users immediately when a suspicious file is detected and blocked. Detected files are placed in quarantine so the user can inspect and, if it's a false positive, restore them.

"The Mac has a solid reputation for remaining relatively threat-free," said PC Tools CEO Simon Clausen. "However, we are witnessing the use of low-level malware scripts to identify whether there is the potential to infect the Mac OS, as well as the opportunity for malware producers to obtain a significant return on investment."

iAntiVirus is a free download; full support and updates for a year will cost $29.95.Macworld

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.