Welcome to Process-info.org library

Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.

Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.

It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.

The Latest News

15 latest global news related to computer security

April 24, 2015 3:09:23 AM CEST

Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

 

April 24, 2015 3:09:23 AM CEST

Trojan-Spy:W32/FinSpy.A – Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.

 

April 24, 2015 2:56:00 AM CEST

Scam Facebook Page - 'Facebook International Lottery Program' – The purpose of the so-called 'Facebook International Lottery Program' Page is to make the claims made in advance fee scam messages appear more legitimate.

 

April 23, 2015 5:22:00 PM CEST

Study: Firms not ready to respond to complex threats – Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA.Another 41 percent said they're only confident in their ability to respond to simple issues, and 13 percent said that they're not confident at all.One reason? Significant hiring shortages in the information security space.Only 16 percent of respondents said that at least half of their applicants were qualified, while 53 percent said it can take three to six months to find a qualified candidate. And 35 percent of companies said that they have job openings that they cannot fill."You're getting these resumes, but you have to reject most of them," said Eddie Schwartz, president and COO at White Ops, who is also chair of ISACA's Cybersecurity Task Force. "That's a very difficult position to be in if you're an employer."The biggest skill gap? Ability to understand the business, according to 72 percent of the respondents."The cyber workforce has not kept up from the skills and training perspective," said Schwartz.Technical skills were mentioned by 46 percent of respondents, followed by community skills by 42 percent.This isn't a problem that can be solved overnight, he said. Outsourcing and automation can help, as can attracting more women to the profession, and working with college programs to help them offer more cybersecurity courses."We have to have people taking the correct education at the university level -- and there aren't enough today anywhere in the world," he said. "It will take years to solve the human resource gap."[ Young adults clueless on cybersecurity profession ]Other bad news in the study was that 77 percent said they saw more cyberattacks in 2014 than the previous year, and 83 percent said that it was likely to very likely that they will experience a cyberattack in 2015.There was some good news as well, however, and that was in the fact that companies are beginning to take security more seriously."Even when IT departments are seeing cuts in their budgets, information security budgets are not being cut," said Schwartz.Security budgets are increasing this year at 56 percent of companies, 83 percent test their security controls at least annually, and 79 percent said that their board of directors were concerned with cybersecurity."My personal experience is that historically, it was very very difficult for a VP-level or C-level Chief Information Security Officer to get board level attention to issues such as security training or awareness," said Schwartz. "But with the emergence of some of these advanced actors, some of these sophisticated cybercriminal groups, some hacktivist groups, boards of directors are now paining attention."Executives demonstrate this support in a number of ways, respondents said. For example, 71 percent enforce security policies, 63 percent provide security with adequate funding, and 56 percent mandate security awareness training.However, security reports directly to the board of directors in only 11 percent of companies and to the CEO in 20 percent, while 60 percent of the time, security reports to the CIO.

 

April 23, 2015 5:18:00 PM CEST

Reporting cybercrime feels like ‘Groundhog Day' – For those in the cybersecurity industry trying to get coverage from top-tier journalists in the field and there are many thousands trying to do just that at RSA 2015 in San Francisco this week here is what not to do: Pitch what everybody else is pitching. That is the best way to get them to ignore you.On a panel titled, "Gumshoes Part Deux Security Investigative Journalists Speak Out," at RSA 2015 Wednesday morning, that was one of the more emphatic pieces of advice.[ Follow all the coverage from RSA 2015 ]The panel Kevin Poulsen, a contributor to Wired; Brian Krebs whose blog KrebsonSecurity is must reading in the industry; Nicole Perlroth of The New York Times; and Joseph Menn of Reuters said they are generally looking for things that have not happened before, or haven't been reported to death.In other words, things like data breaches, and reports on data breaches, are so last week, last month and last year. "I can't cover every security report or breach," Perlroth said, adding that the number of solicitations she gets to cover them can reach several hundred a day."The criteria we set is whether it is a new kind of threat," she said, although in the next breath she admitted that a few like the Sony breach stand out from the crowd. "I ended up covering that, of course," she said.The same applies to things like APT reports. "They've gotten out of control," she said. "APT1 was something new. But now we're up to APT24." She said the Times decided not to cover a recent report on White House and State Department hacks, in part because, "it would be advertising for security firms."Menn said part of the problem is that doing the same stories on the same topics tends to make both reporters and their readers numb, even if they are important issues."We have to keep raising the bar on what is new, fresh and different," he said. "I'm not going to do the same story again. I have to bring something new to the party."And Krebs admitted that even though, as an independent he can cover whatever he chooses, he sometimes gets sick of recurring topics.When yet another breach happens, he said he asks himself, "Does this breach really matter? Is it going to hurt us that much more?"Especially, he said, since, "identity data is so compromised across the board all of your information went up for sale on the underground years ago. We are here at an authentication conference, and we still haven't fixed that."Perlroth said she sometimes jokes that after four years covering cyber security she sometimes feels like she is on the cop beat. "We've been talking about the same problems for four years, so it does feel like Groundhog Day," she said.

 

April 23, 2015 3:41:00 PM CEST

Mobile malware infections may be overhyped – Mobile users in the US are 1.3 times more likely to be struck by lightning than malware, new research has found.Atlanta-based security firm, Damballa, has released data at the RSA conference in San Francisco that suggests the problem of mobile malware has been overemphasised.The firm presented its findings at the conference based on this big data set, the research team set out to determine actual malware infection rates.As part of the study, it excluded malware samples found or vulnerabilities and theoretical attacks.Damballa senior scientific researcher, Charles Lever, presented the firm's findings and sought to highlight the actual risks to devices, the number of devices seen communicating with known bad domains, and the comparison to historical rates."iOS developers must submit an application for approval before their app is available on iTunes. Google has developed "Bouncer", a system that scans submitted apps for evidence of malware.""So for a majority of the population, by simply staying within the authorized app stores for their respective devices, they will drastically reduce the risk of being infected with mobile malware."Read more:Mandatory Disclosure Laws needed to counter lax security attitudes: SymantecThe firm conducted a previous study in 2012 with the same objective. At the time, Damballa monitored about 33 per cent of US mobile data traffic.The same study was repeated in Q4 2014. Damballa now monitors about 49 per cent of US Mobile Data TrafficAccording to the 2014 study, 9688 out of a total of 151 million mobile devices contacted mobile blacklist domains amounting to 0.0064 per cent.Read more:Cloud Distribution builds security portfolio with LastlineLever said mobile operators and platforms have invested significant resources in preventing malicious applications from being installed, especially in North America.Damballa chief technical officer, Brian Foster, said it would be naïeve to think there is no risk in mobile, but the true extent of mobile infections is still not widely understood."By understanding these risks, organizations will be better able to apply network-based countermeasures to help detect and protect themselves going forward."Read more:AWS and VMware are market leaders in IaaS and on-premises Cloud platforms: 451 Research

 

April 23, 2015 3:32:00 PM CEST

Juniper to team up with Cyphort for new threat intelligence platform – Cyphort and Juniper Networks have announced a partnership to deal with advanced security threats.Cyphort will be providing its Advanced Threat Defense Platform (ATDP) with Juniper's Spotlight Secure open threat intelligence platform, which means that Juniper's SRX firewalls will have their protection policies continuously update to match advanced threats that avoid traditional signature based detection.The partnership was announced at the RSA security conference in San Francisco."This integration will allow us to provide enforcement coverage from advanced threats for enterprise customers at scale," said Jeremy Carlson, senior director of business development, Cyphort."The need for payload analysis to share data with gateway equipment for enforcement is becoming critical in the current enterprise threat landscape, where signature based approaches are necessary but no longer sufficient and every attack is targeted."Cyphort claims its security solution uniquely generates threat containment data, including IP addresses, IPS signatures, and website URLs that enterprise customers can implement within their security infrastructure to stop malware activity at the perimeter.The integration with Juniper's firewalls means Cyphort's ATDP will automatically push IP addresses to block targeted attacks in real-time and directly to SRX management control points, which then inform SRX enforcement points in less than 60 seconds, it is claimed.Read more:HP increases its play in the security space"Integrating our high-performance security solutions with Cyport's Advanced Threat Defense Platform will greatly benefit enterprises and provide a tool that can be tailored for each unique threat," said Denise Shiffman, corporate vice president of product management, Juniper Networks.Cyphort was founded in 2011 and develops software and appliance based solutions that protects against targeted & advanced threats, corporate espionage and IP theft, fashioning itself as a competitor to FireEye.Read More:Centrify launches its Centrify Privilege Service solutionAcronis: How SMBs can protect data in hybrid virtual and physical environments

 

April 23, 2015 3:27:30 PM CEST

Avast Battery Saver raises the bar with new Wi-Fi-based smart profiles – We’ve recently told you about Avast Battery Saver, an application which saves your Android’s power without hassle. It optimizes phone settings such as Internet connectivity, screen brightness, and timeout according to your needs. We’d now like to announce an exciting new feature of the app: Wi-Fi-based smart power profiles. These profiles are activated automatically based […]

 

April 23, 2015 2:44:00 PM CEST

Misleading Warning Claims You Can Expose Facebook Hackers by Looking in Active Sessions – According to a 'warning' message currently circulating on Facebook, you can see how many people are currently hacked into your Facebook account by examining Active Sessions in your account's security settings.

 

April 23, 2015 2:08:00 PM CEST

Wi-Fi client vulnerability could expose Android, Linux, BSD, other systems to attacks – A serious flaw in a component that's used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks.The vulnerability is in wpa_supplicant, an open-source software implementation of the IEEE 802.11i specifications for wireless clients.The component is cross-platform and is used to control WPA and WPA2 wireless connections on Android, Linux and BSD systems. It can also be used by some third-party wireless software on Mac OS X and Windows, but these operating systems have their own built-in supplicant implementations that are used by default.The vulnerability stems from how wpa_supplicant parses SSID (Service Set Identifier) information from wireless network frames when the CONFIG_P2P option is enabled. If exploited, the flaw can allow attackers to crash the client (denial of service), read contents from the process's memory or inject arbitrary data into its memory, which could result in arbitrary code execution.All versions of wpa_supplicant from 1.0 to 2.4 are vulnerable. A patch was released Wednesday and operating systems are expected to update their packages."The vulnerability is easiest to exploit while the device has started an active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress)," said Jouni Malinen, maintainer of wpa_supplicant, in an advisory posted on the OSS security mailing list. "However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress."The vulnerability was discovered by the hardware research group at Alibaba and was reported to the wpa_supplicant development team by the Google security team.Users should install the security updates for wpa_supplicant when they become available for their operating systems. A mitigation in the meantime is to disable P2P for each wireless interface in the wpa_supplicant configuration file by following instructions in the advisory.Unfortunately, wpa_supplicant is also used on embedded devices, for which patches are not as frequently released or easy to install.

 

April 23, 2015 1:00:20 PM CEST

The Evolution of Bullying: From Schoolyard to Smartphone 24/7 – The phenomenon of bullying is nothing new - many adults can recall being bullied in their childhood.

 

April 23, 2015 9:00:00 AM CEST

Downloader.Ponik!gen13 – Risk Level: Very Low. Type: Trojan.

 

April 23, 2015 9:00:00 AM CEST

Exp.CVE-2015-1701 – Risk Level: Very Low. Type: Trojan.

 

April 23, 2015 9:00:00 AM CEST

W32.Ransomlock.AO!inf2 – Risk Level: Very Low. Type: Virus.

 

April 23, 2015 9:00:00 AM CEST

W32.Ransomlock.AO!gen1 – Risk Level: Very Low. Type: Virus.

 
 
 

Navigate through library of processes alphabeticaly by first letter: