Welcome to Process-info.org library
Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.
Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.
It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.
Recently added processes
Recently updated processes
Top security risk processes
The Latest News
15 latest global news related to computer security
January 29, 2015 3:09:03 AM CET
Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.
January 29, 2015 3:09:03 AM CET
Trojan-Spy:W32/FinSpy.A – Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.
January 29, 2015 3:07:08 AM CET
Android.Fakescarav – Risk Level: Very Low. Type: Trojan.
January 29, 2015 12:50:04 AM CET
VU#967332: GNU C Library (glibc) __nss_hostname_digits_dots() function vulnerable to buffer overflow – The__nss_hostname_digits_dots()function of the GNU C Library(glibc)allows a buffer overflow condition in which arbitrary code may be executed. This vulnerability has been assigned CVE-2015-0235,and is referred to in the media by the name"GHOST".
January 28, 2015 7:18:00 PM CET
EU air passenger database about to take flight, but critics want it grounded – The European Commission is reportedly revving up the engines on a controversial plan to retain passenger flight data across the EU, although a prior attempt got its wings clipped due to privacy concerns.The new plan calls for a database with personal flight data such as travel dates, itineraries, ticket information and baggage information, according to a document published by Statewatch on Wednesday and described as a leaked and legitimate EC document.The plan is being fast-tracked by the Commission in the wake of the shootings at French satirical magazine Charlie Hebdo earlier this month.Critics say such a database could violate fundamental human rights, but the Commission argues that it would help law enforcement with the prevention, detection, investigation and prosecution of terrorist offenses and serious transnational crime.An earlier proposal was shelved in 2013, when the European Parliament rejected the plans out of concern that they would violate fundamental rights. But since then, calls for such a database have become louder, and they are reaching a crescendo after the Paris attacks.The Commission is now proposing a "workable compromise" to overcome political differences with the European Parliament, according to the published document.The revised plan for a Passenger Name Record (PNR) database for EU flights aims "to strengthen the data protection safeguards, while preserving the operational effectiveness of the PNR proposal to fight terrorism and serious transnational crime," the document reads.A Commission spokeswoman declined to comment on the authenticity of the document. She did say that the Commission is working "on all possible options," and that those need to be carefully assessed to reach a quick and effective result on the EU PNR proposal, fully in line with fundamental rights.According to the leaked document, the Commission for example wants to narrow law enforcement access to the database for the purposes of fighting terrorism and "serious transnational crime", leaving out "serious crime." It also wants to reduce the retention period of the full PNR data to 7 days from 30 days. After that period, the data would be "depersonalized" and remain available for a period of four years -- instead of the original five years -- for investigations of transnational crimes. However, authorities investigating terrorism would get access to five years worth of data.The leaked document also reveals that the EC wants stricter conditions for access to PNR data, so a Data Protection Officer would be appointed within national Passenger Information Units to be responsible for the processing of the data. Optionally, such transfers could also be overseen by a country's judicial authority, the Commission is proposing, adding that passenger rights should also be spelled out in order to explain how they could access their data and how to request the modification or erasure of their data.The proposal, leaked ahead of an informal EU ministerial meeting in Riga where anti-terror measures will be discussed, is "a re-heated version of the existing, stalled proposal," Philipp Albrecht, vice-chairman of the Parliament's Committee on Civil Liberties, said in a statement."Following the crystal clear judgement by the European Court of Justice last year, which declared blanket mass surveillance measures as incompatible with EU fundamental rights, it is unthinkable that the Commission would try and bulldoze through a PNR scheme based on blanket data collection," he said, adding that instead of creating a vast data dragnet, targeted surveillance would be a better solution.However, Albrecht might have a tough sell in the civil liberties committee after the Paris attacks. The European Parliament's rapporteur on the PNR proposal, Timothy Kirkhope, and a small subgroup of the committee are set to meet with Commission officials and national experts on Feb. 4 to discuss how to go ahead with the plan, according to one of his office's staffers."PNR has been proven as vital in the fight against terrorism," Kirkhope said earlier this month, adding that he wants an agreement that safeguards lives and liberties by offering stronger data protection rules."EU heads of government and home affairs ministers would not ask for this agreement unless there were a clear and present need for it," he said, vowing to work with the committee to get the broadest agreement as possible. "There are a few people in the committee who will never be convinced, but I believe there is a majority that can be found for a revised proposal."According to information on the Parliament's website, the use of PNR data is not currently regulated at the EU level, but some member states have a PNR system, including the U.K., while other member states have either passed laws or are testing PNR data systems. An EU-wide PNR system would centralize the collection and processing of the data.Loek is Amsterdam Correspondent and covers online privacy, intellectual property, online payment issues as well as EU technology policy and regulation for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to firstname.lastname@example.org
January 28, 2015 5:38:00 PM CET
Canadian agency reported to be monitoring millions of downloads – A Canadian surveillance agency is tapping into Internet cables and analyzing up to 15 million downloads from popular file-sharing websites each day, in an effort to identify political extremists, according to a news report by The Intercept and CBC News.The Canadian Communications Security Establishment [CSE] program allows the agency to monitor downloads in several countries across North America, Europe, the Middle East and North Africa, according to the news reports, published Wednesday morning. The reports are based on leaks from Edward Snowden, the former contractor at the U.S. National Security Agency.The CSE program, called Levitation, allows the agency to monitor downloads from popular websites used to share videos, photographs, music and other files, according to the reports. The goal of the program is to identify people downloading or uploading content connected to terrorism, such as bomb-making guides or hostage videos, the news reports said.In the effort to identify people connected to terrorism, the CSE shifts through records of millions of downloads and uploads from Internet users not suspected of criminal activity, the reports said.CSE's press office didn't immediately respond to a request for comment on the stories, but the agency did tell the news organizations that it is "legally authorized to collect and analyze metadata, including from parts of the Internet routinely used by terrorists." The agency's activities are not directed at Canadians, CSE said.The news reports take their information from a mid-2012 PowerPoint presentation. In the presentation an analyst, apparently joking, says the Levitation system is sometimes overloaded with downloads of the TV series Glee. CSE finds about 350 "interesting" downloads each month, according to the presentation.At the time, the program monitored activity on 102 file-sharing websites, including RapidShare, SendSpace and the shuttered Megaupload, the presentation said.Privacy groups questioned CSE's activities."CSE is clearly spying on the private online activities of millions of innocent people, including Canadians, despite repeated government assurances to the contrary," David Christopher, communications manager of digital rights group OpenMedia.ca, said on the group's website. "Law-abiding Internet users who use popular file hosting services are now finding themselves under the government's microscope."With Canadian IP addresses among those targeted, "this amounts to spying on the private information of innocent Canadians, at any time, without a warrant," he added. "This alarming development underlines the need for robust action to rein in CSE's reckless and out of control spying activities."Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is email@example.com.
January 28, 2015 5:00:15 PM CET
Online privacy protection in the EU – It’s European #DataProtection day! Every day we visit websites and willingly hand over our name, address, and credit card number. Have you ever thought about what happens to that data or what your rights are? Members of the European Union (EU) enjoy a high standard of protection of their personal data. The Digital Agenda for Europe […]
January 28, 2015 4:15:00 PM CET
Twenty-eight percent of security spending wasted on shelfware – The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research."As much as 60 percent of security software remains completely unused in some organizations," the report said.Almost all of this wasted spending was on traditional packaged software, because cloud services are typically billed based on use and need little or no additional configuration or customization.Specifically, 81 percent of security software was still delivered in the traditional way, compared to 19 percent that was cloud-based, according to the survey of IT decision makers in large and small companies."There's obviously a lot of products still being sold in the traditional, old-school model," said Josh Shaul, VP of product management at Chicago-based Trustwave Holdings, Inc., which sponsored the report.What happens is that companies buy the software this year, and hope to get the budget to actually operationalize the software next year, he said."That strategy fails," said Shaul.Next year just brings a new set of challenges, and a new set of software to buy."The software is bought to check the box, to calm down the management, to show you're doing something," he said. "But now you're just building up more stuff on the shelf that you're going to 'roll out next year'."To be more exact, 35 percent of survey respondents said that software was sitting on the shelf because IT was too busy to implement it properly.33 percent said that IT didn't have enough resources. 19 percent said IT did not understand the software well enough. 18 percent cited insufficient vendor support. 17 percent said IT didn't have sufficient skills or training.Only 12 percent said that IT did not understand the security problem well enough.The ratio of spending that goes to traditional software is changing, however.In 2015, the percent of security software bought traditionally is expected to fall from 81 to 72 percent.One striking finding was that smaller organizations were spending quite a bit more money on their security technology than large companies.Those with 1,000 Internet-enabled users or fewer spent an average of $156 on security technology per user -- but larger companies spent just $73."When a large enterprise goes to buy endpoint protection for the 50,000 endpoints they've got, that's going to justify a pretty significant discount," said Shaul, with some volume discounts going as high as 80 percent."The deck is stacked against the small and medium business," he said.As a result, small companies are turning to cloud-based security providers at a faster rate than large ones.According to Osterman Research, not only are cloud-based solutions less wasteful, but they're also typically cheaper than traditional software. They also help smaller companies save on personnel."Smaller organizations cannot spread the cost of IT labor over as large a group of users like their enterprise counterparts, and so smaller organizations spend more for IT labor on a per user basis," said the report.
January 28, 2015 3:30:00 PM CET
Blackphone super-secure communications app had serious flaw – The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on the phone.The bug, which was fixed before it was disclosed publicly Tuesday, shows that even devices built with security and privacy in mind can have serious flaws that compromise their defenses.Blackphone is a high-end smartphone that runs a modified and locked-down version of Android called PrivatOS. It comes preloaded with apps for end-to-end encrypted text messaging, audio calling and video conferencing, as well as secure online storage.The phone is manufactured by Switzerland-based SGP Technologies, a joint venture between Silent Circle, a provider of encrypted communications services and Spanish phone manufacturer GeeksPhone.The vulnerability in SilentText, one of the apps bundled with Blackphone, was discovered by Mark Dowd, founder of Australian security consultancy firm Azimuth Security."While exploring my recently purchased BlackPhone, I discovered that the messaging application contains a serious memory corruption vulnerability that can be triggered remotely by an attacker," Dowd said in a blog post that contains the technical details of the bug. "If exploited successfully, this flaw could be used to gain remote arbitrary code execution on the target's handset."The malicious code would execute in the context of the SilentText app and would inherit its privileges. This means the attacker could decrypt text messages, gather location information, read the phone's contacts and write to the external storage, Dowd said.If the attacker also had knowledge of an Android privilege escalation exploit that affects PrivatOS, he could use it after exploiting the SilentText vulnerability to gain root or kernel access on the device. This would give him complete control over the phone.The only knowledge an attacker would have needed to exploit the SilentText vulnerability was the target's Silent Circle ID or phone number."This issue is now patched by both Silent Circle and Blackphone in the respective App Stores / Product updates," Dowd said.Blackphone users can update to the latest firmware version following the instructions on the product's support site.This is not the first vulnerability discovered in Blackphone, but is likely one of the most serious ones found to date. Silent Circle and SGP Technologies run vulnerability reward programs for their respective products through the Bugcrowd platform. Statistics on the Bugcrowd site show that 25 issues have been found and rewarded so far in Blackphone and 37 in the Silent Circle apps and services.
January 28, 2015 2:01:00 PM CET
Cisco integration gives Samsung Knox users more options for secure connectivity – Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.Integration with Cisco's VPN platform is important because most enterprises use Cisco gear, according to Leif-Olof Wallin, research vice president at Gartner. Samsung's Knox platform is used to protect applications and data on the smartphone or tablet and Cisco's AnyConnect for Samsung Knox is used to secure the communication.These kinds of collaborations are about making it easier to reuse existing equipment for new functions. In this case, enterprises don't want to invest in new VPN gateways, so its up to Samsung to provide the widest possible support for different software and hardware.The integration also means AnyConnect becomes safer because the platform gains a secure way to store the keys and certificates necessary to protect the communication with Knox, Wallin said.Knox can also use VPN connectivity from F5 Networks and Juniper Networks.The end of last year saw Samsung step up its enterprise push. Slowing smartphone sales have made the enterprise market more important for Samsung and its competitors.In November, the company announced a partnership with BlackBerry to integrate BES (BlackBerry Enterprise Server) 12 with Galaxy smartphones and tablets. With this collaboration, Knox users will get yet another way to communicate securely.The free AnyConnect for Samsung Knox app can be downloaded from Google's Play store. Cisco also offers the AnyConnect ICS app, which works with smartphones and tablets that use Android 4.0 or later versions of Google's OS. Recently, Cisco added support for Android 5.0 (Lollipop) as well.Send news tips and comments to firstname.lastname@example.org
January 28, 2015 11:42:00 AM CET
A single DDoS attack can cost a company more than $400,000 – According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the company.
January 28, 2015 9:38:23 AM CET
Not So Spooky: Linux “Ghost” Vulnerability – Researchers at Qualys have found a vulnerability in the GNU C Library (alternately known as glibc), which can be used to run arbitrary code on systems running various Linux operating systems. The vulnerability (assigned as CVE-2015-0235) has been dubbed GHOST and is the latest vulnerability to receive a “friendly” name, joining others like Heartbleed, Shellshock, […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNot So Spooky: Linux “Ghost” Vulnerability
January 28, 2015 9:00:00 AM CET
Trojan.Filurkes.B – Risk Level: Very Low. Type: Trojan.
January 28, 2015 8:04:12 AM CET
CVE-2015-0016: Escaping the Internet Explorer Sandbox – Part of this January’s Patch Tuesday releases was MS15-004, which fixed a vulnerability that could be used in escalation of privilege attacks. I analyzed this vulnerability (designated as CVE-2015-0016) because it may be the first vulnerability in the wild that showed the capability to escape the Internet Explorer sandbox. As sandboxing represents a key part […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCVE-2015-0016: Escaping the Internet Explorer Sandbox
January 28, 2015 7:00:56 AM CET
Infographic: Privacy tips for business – Privacy plays a growing part in customer buying decisions. With every data breach, trust is eroded further. Privacy and security are intertwined when it comes to our individual information. Consumers are becoming increasingly aware of the value of their personal data, so that means that businesses have to step up and do a better job […]