Welcome to stopmalware.co.uk, we are in a unique position to help information security professionals deal with the constant tidal wave of attacks infiltrating infrastructures and evading conventional antivirus engines, firewalls and intrusion detection systems. Stopmalware.co.uk is owned and operated by Omnetix Limited, Omnetix launched stopmalware.co.uk in partnership with FireEye Inc. following a successful deployment of FireEye Malware Protection System appliances, taking in 10 different countries for one of the largest Private Equity (PE) firms in Europe. To find out how we can help you stop malware in your environment quickly and effectively, please send a message through our "Contact Us" page or call us on 0844 351 0309 so we can discuss your requirements further.
We would be happy to arrange an online demonstration, web conference, presentation, datasheets, evaluations or proof of concept. We hope you find these pages useful please feel free to register and join in our community of malware interested professionals.
Great chance to own an iPad and fix your zero day malware exposure.
Throughout the month of February 2011 we are giving away an iPad with every FireEye malware protection appliance purchased across the whole range of appliances. Yes that means if you buy 10 appliances you will get 10 iPads. This applies to all orders received in the period, upon payment of invoice. Please call 0844 351 0309 and mention this offer when speaking to our staff.
Microsoft Security Advisory (2490606)
Yesterday Microsoft warned us of a vulnerability in its Windows Graphics Rendering Engine. To that end they have clarified that the systems affected are Windows XP, Server 2003, Vista and Windows Server 2008 with service pack 2 and that Windows 7 and Windows Server 2008 R2 are unaffected. The vulnerability could result in an attacker running arbitary code as if they were withhin a logged on users security security context. However in order to make use of the vulnerability a user would have to be persuaded to visit a specially crafted web page to view a malicious image or open a specific office document containing the malicious image.
Wikipedia has this to say about Operation Aurora. Operation Aurora is a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China.