Risk
3/25/2009
02:43 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Panda Security Offers Free Panda USB Vaccine To Block Malware

Solution designed to block malware that spreads through removable drives, such as pen drives, CD/DVD drives, and other data storage devices

GLENDALE, Calif., March 25 /PRNewswire/ -- Panda Security, a world leader in IT security, announced that it is offering Panda USB Vaccine, a free security solution designed to block malware which spreads through removable drives such as pen drives, CD/DVD drives, and other data storage devices. There is an increasing amount of malware which, like the dangerous Conficker worm, spreads via these removable drives to devices such as MP3 players, PCs, and digital cameras. The Panda USB Vaccine protects removable drives from this threat and keeps systems safe from malware infection. This free tool can be downloaded from: http://www.pandasecurity.com/usa/homeusers/downloads/usbvaccine/.

The basic technique used for malware infection is as follows: Windows uses the Autorun.inf file on these drives or devices to determine which action to take when they are connected to the computer. This file, which is on the device's root directory, offers the option to define a program to automatically run part of the content stored on the device when it connects to the computer. Cyber-crooks are increasingly using this feature to spread viruses through the modification of Autorun.inf with commands so that malware stored on the USB drive, for example, is run automatically when the device connects to a computer. This will immediately infect the computer in question.

In response to this trend Panda Security, through its Panda Research division, has developed Panda USB Vaccine, a free product which offers a double layer of preventive protection, allowing users to disable the AutoRun feature on their computers as well as on USB drives and other devices.

"This is a very useful tool as there is no easy and intuitive way of disabling the AutoRun feature in Windows," explains Pedro Bustamante, senior research advisor at Panda Security. "Panda USB Vaccine makes it simple for users to provide their systems with a high level of security against infections through removable drives and devices."

About Panda Security

Panda Security is one of the world's leading IT security providers, with millions of clients around the globe and products available in over twenty languages. Our mission is to keep our customers' information and IT assets safe from security threats, giving them the most effective protection with the minimum resource consumption.

Every day, thousands of new malicious codes are created. To combat this threat, Panda Security has developed an innovative and unique security model which can automatically analyze and classify thousands of new malware samples. This model is collective intelligence and ensures that Panda Security solutions can protect against far more threats than the products of any other company. The exceptional detection capacity of collective intelligence can be put to the test at the Infected or Not website (http://www.infectedornot.com)

For more information and evaluation versions of all Panda Security solutions, visit our website at: http://www.pandasecurity.com/

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.