Changed the whole way how the files are stored Changed the whole encryption mechanism Improved the self-defense mechanism Extended the...
Just to better explain some things: ZeroAccess doesn't bypass PatchGuard at all, it uses different ways of infection on x64 and x86 Windows...
Hi guys, if you are interested I've updated the tecnical paper describing the mechanisms behind ZeroAccess at this link:...
I'm going to release a blog post with more technical details ;)
Android ‘Angry Birds’ Malware Contains Bot-like Code
Not sure what you mean :) It is Prevx4 actually, improved with Webroot technologies that helped us in enforcing our detection rate and global...
It's Prevx4 joined with Webroot team's expertise and technologies ;)
:o Didn't see this topic :D Thank you guys for all your support to us :) Our mission will always be your happiness and your cyber security ;)
FYI: the fp has been fixed ;)
No, the patch released by Microsoft is related to other win32k.sys issues, the one discovered on 24th Nov is still unpatched ;)
no it doesn't
PrevxHelp already replied to you :) I've answered to some questions about the deal in an interview to an italian online magazine and one of the...
I didn't ignore it, I just don't know what else to reply moreover than what has been already written many times in this thread
We'll stay far more than that :) Anyway, since we're here, why not going ahead all together on the road to Prevx 4? ;)
Sure it will be. Why it shouldn't? Here we are, as yesterday and as tomorrow ;)
Why shouldn't I? :wacko:
Do you like our product as it is? Do you have confidence in us? :) If so, don't stop now as we are still the same team. If you really want to...
Guys, you have had confidence in us during all these years, you have always been our top priority with your feedbacks and your wish lists. The...
Quoting Wikipedia: TDL3/4 rootkit bypasses Patchguard by design, because it doesn't patch Windows kernel in any way. It does patch miniport driver
Happy birthday :thumb: Enjoy it :thumb:
Yes, that's what I've highlighted before in this post Actually the code changed a bit since the one I posted before, but the goal is the same
Hi, we are investigating this issue and we are going to fix it. Actually it is very funny reading these childish attempts to break security...
Sorry, what PoC have you tried? The last one won't work on Windows 7 by design: push offset dword_415210 call RtlGetVersion cmp...
hahaha ;D nope, we didn't implement it yet, it's a new feature of Prevx 4.0 ;D
Not sure actually :) Do you use any other security software?
Separate names with a comma.