ADAOX Middle East, the exclusive distribution partner and the regional business development centre of ESET NOD32 Antivirus, today announced the release of ESET’s new products - ESET NOD32 Antivirus 4 for Mac OS X and Linux - for public Beta testing for its customers in the Middle East.
ESET NOD32 Antivirus 4 for Mac and ESET NOD32 Antivirus for Linux, respectively meet the demanding criteria for advanced PC protection, detecting threats engineered for a multitude of platforms. All ESET products employ advanced heuristic analysis that creates a layer of defense against emerging threats and use generic signatures for reliable detection of mutations of known viruses.
“By developing a security solution for Linux and Mac, ESET is responding to the user demand, as well as the vulnerability of these operating systems to exploits. The need to extend protection to these platforms stems from the fact that they have been known to act as a carrier for computer threats infecting other workstations in the network running on the Microsoft Windows platform,” says Mr. Neo Neophytou, Managing Director of ADAOX Middle East. “We are confident our Middle East customers using Mac OS X and Linux platforms will find the new beta version of ESET NOD32 Antivirus 4 very useful and efficient in detecting known and unknown internet threats.”
Main features of ESET NOD32 Antivirus 4 for Mac OS and Linux include:
• Automatically detects and cleans malware – including threats designed for Windows, Mac OS X as well as cross-platform malware.
• Advanced scan setup options - ESET NOD32 for Mac OS X enables you to adjust size, time and depth limits for scanning files, archives and other objects.
• Automatically scans removable media to close this widely used infiltration vector
• Protects your system in real time – all file actions, such as Copy, Move, Download are automatically controlled in the background. Focusing on entry points – email attachments, removable media, and downloaded files – ESET NOD32 for MAC OS X ensures that harmful applications are eliminated before any damage can be inflicted.
• Includes comprehensive charts and statistics – all important malware-related stats are directly accessible from the graphical user interface. You can view information on detected threats, detailed scan logs, as well as real-time file-system activity reports.
• Offers intuitive, streamlined graphical user interface (GUI) to enhance the overall user experience, making your job easier
• Regular updates of virus signature database
The products for beta testers are available for download at: http://www.eset.sk/download/beta_verzia
The first botnet for the OS X platform, experts say
The users of the OS X operating system, i.e. Apple Mac users, have been threatened by what is believed to be the first viable computer threat. The detailed description of the new infiltration was published by Virus Bulletin www.virusbtn.com, a monthly magazine specializing monitoring the threat landscape. The Trojan horse discovered by Mario Ballano Barcena and Alfredo Pesoli is dubbed OSX.Iservice and has two variants. The infected computers were subsequently used in a so-called DDoS (Distributed Denial of Service) attack against the website titled dollarcardmarketing.com. According to the authors, OSX.Iservice has created the first botnet – a network of infected computers controlled by a remote attacker – on the OS X platform.
The Trojan was proliferating via P2P networks under the pretence of offering pirated copies of iWork 09 and Adobe Photoshop CS4. The target group was therefore predominantly users who deliberately seek illegal versions of paid software and the Trojan was only activated if the user ran and installed the modified software. The interesting fact is that some of the most sophisticated approaches, including using the Authorization Service API, were implemented in order to create an image of legitimacy and gain the users’ consent with installation.
The new threat has started discussion on the security of Apple’s operating system, which is regarded by many as immune against such exploits. It seems now that the era when this platform was left unnoticed by virus writers is over. "This case only proves that Macs, due to the rising share on the market, are becoming interesting for the authors of malicious code and other perpetrators of cyber crimes. It is not unrealistic to expect an increased number of attacks. The users should avoid falling prey to a false sense of security and use computer and programs with caution. It is the only way to evade social engineering attacks,“ says Juraj Malcho, the head of ESET Viruslab.
© 2000 - 2019 Al Bawaba (www.albawaba.com)