Welcome to Process-info.org library
Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.
Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.
It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.
Recently added processes
Recently updated processes
Top security risk processes
The Latest News
15 latest global news related to computer security
April 24, 2014 3:08:54 AM CEST
AOL spam spreads 'NotCompatible' Android trojan – AOL responds by following Yahoo! in setting strict DMARC policy.
April 24, 2014 3:08:37 AM CEST
Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.
April 24, 2014 1:10:44 AM CEST
Firmware Update for Apple AirPort Devices – Original release date: April 23, 2014 Apple has released firmware update 7.7.3 for AirPort Extreme and AirPort Time Capsule base stations with 802.11ac. The update addresses the OpenSSL "Heartbleed" vulnerability where an attacker may obtain memory contents.US-CERT recommends that users and administrators review Apple Security Update HT6203 and apply the necessary update.For more details and recommended actions regarding the OpenSSL "Heartbleed" vulnerability please see TA14-098A and Heartbleed OpenSSL Vulnerability.pdf This product is provided subject to this Notification and this Privacy & Use policy.
April 23, 2014 11:51:10 PM CEST
Facebook is spring cleaning your News Feed – Last year, Facebook had the dubious honor of containing more spam than other social networks. In order to combat this scourge, Facebook recently announced a series of improvements to the News Feed to help ensure that spammy content does not drown out the posts that people really want to see from friends and Pages they […]
April 23, 2014 9:01:53 PM CEST
VU#495476: Openfire contains an uncontrolled resource consumption vulnerability – Openfire 3.9.1,and possibly earlier versions,contains an uncontrolled resource consumption(CWE-400)vulnerability when using XMPP DEFLATE message compression.
April 23, 2014 7:18:53 PM CEST
VU#720951: OpenSSL heartbeat information disclosure – OpenSSL 1.0.1 and 1.0.2 beta contain a vulnerability that could disclose sensitive private information to an attacker. This vulnerability is commonly referred to as"heartbleed."
April 23, 2014 6:49:18 PM CEST
Cybercriminals Take Advantage Of Heartbleed With Spam – Since news about Heartbleed broke out earlier this month, the Internet has been full of updates, opinions and details about the vulnerability, with personalities ranging from security experts to celebrities talking about it. Being as opportunistic as they are, cybercriminals have taken notice of this and turned the furor surrounding Heartbleed into lure for a spam […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCybercriminals Take Advantage Of Heartbleed With Spam
April 23, 2014 5:15:00 PM CEST
Easter bunnies for all occasions – On the eve of Easter, we noticed an unusual chain of spam messages. The spammers offered various services: from reducing mortgage costs and helping repay a loan, to enhancing male sexual performance. Neither the subject nor the text of the message had any allusions to the approaching holiday; however, the links leading to the sites advertised by the slogans included Easter-themed keywords: eastertime, easterbunnies, greateastern.
April 23, 2014 3:13:00 PM CEST
Data breaches on the rise as attacks get more complex – There were 1361 confirmed data breaches reported worldwide in the first calendar quarter of 2014, up 119 per cent on the 621 breaches during the same period last year, according to Verizon.The networking firm's 2014 Data Breach Investigations Report also found that there were over 63,000 security incidents during the quarter, up from 47,000 a year earlier.Verizon Australia senior solutions consultant Aaron Sharpe said the reason data breaches have "got worse" since last year is that the types of breaches and sophistication of these attacks has become more "complex and extensive."For example, a pattern which the vendor has labelled crimeware has emerged. Crimeware brings together Web loggers, distributed denial of service (DDoS) attacks and spamming to target companies for financial gain, he said."The primary goal of crimeware is to gain control of systems as a platform for stealing credentials, launching distributed denial of service (DDoS) attacks or spamming. When Web loggers and other software is chained together, it can lead to a breach or security incidence."According to the Verizon report, there were 12,535 reported incidents of crimeware globally.Sharpe said organisations should keep anti-virus software and Web browsers up to date and consider implementing configuration change monitoring to reduce their risk.Meanwhile, there were 16,554 incidents due to miscellaneous errors, the majority of these were due to human error such as people sending sensitive emails or documents to the wrong person. Another common mistake was posting private information to a public folder or even an external website.He recommended that organisations consider implementing data loss prevention software to reduce instances of sensitive documents getting sent by email."People should also tighten up processes around posting documents to internal and external websites and scan the Web for non-public data," he added.Insider and privilege misuse was also a big trend with 11,698 incidents reported.Sharpe said this misuse can be caused by system administrators or people from outside who are paying off staff that have access to key information."It could also be an employee who is ticked off or angry with the organisation and wants to cause some damage."The corporate local area network (LAN) was used to steal information in 85 per cent of reported cases, the report said. Top targets including the public sector, real estate, transportation, manufacturing and mining companies.Sharpe recommended that companies and government agencies review user accounts."Having identified who has access to sensitive data, implement a process for revoking access when employees give notice or are dismissed. IT staff should also set up controls or watch for data transfer out of the organisation."Lost and stolen assets, such as laptops accidently left at airports, continued to be a problem for organisations with 9704 cases reported globally. The report suggested that organisations should encrypt devices."Considering how often assets go missing, encryption is as close to a no-brainer as it gets. While it won't affect the changes of an asset going missing, it can save a lot of financial and reputation damage," read the report.Finally, there were 3937 Web application attacks reported during the quarter. These attacks occur when vulnerabilities in applications are exploited. Three out of four Web application attacks were attributed to activist groups such as Anonymous."They typically exploit some weakness in the application and then go to the press and say `Look what we have done,'" Sharpe said.Organisations should patch their content management system (CMS) to try and stop these attacks, Sharpe said."If you're committed to an active platform such as WordPress, set up an automated patch process. If this isn't possible, develop one and stick to it. Consider switching to a static CMS. Instead of executing code to generate this content for every request, this will pre-generate pages and reduce the opportunity for exploits."
April 23, 2014 3:06:25 PM CEST
Apple Releases Security Updates for OS X, iOS devices, and Apple TV – Original release date: April 23, 2014 Apple has released security updates for Mac OS X, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow an attacker to execute arbitrary code, cause application termination, or expose users to covert eavesdropping.Updates available include:Security Update 2014-002 for OS X Lion v10.7.5, OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.2.iOS 7.1.1 for iPhone 4 and later, iPod touch 5th generation and later, or iPad 2 and later.Apple TV 6.1.1 for Apple TV 2nd generation and later.Users and administrators are encouraged to review Apple Security Updates HT6207, HT6208, and HT6209, and apply the necessary updates to help mitigate these risks. This product is provided subject to this Notification and this Privacy & Use policy.
April 23, 2014 1:50:00 PM CEST
Media and entertainment industry targeted in cyberattacks – A new report has revealed more than half of cybercriminal attack traffic in the first quarter of 2014 was aimed at the media and entertainment industry.That's according to the Prolexic Q1 2014 Global DDOS (distributed denial of service) Attack report, which has found cybercriminals are increasingly targeting the media and entertainment industry.Learn how smart CIOs are protecting customers from security breachesThe report shows 54 per cent of malicious packets mitigated by Prolexic during the first quarter were directed at this industry.Akamai general manager of security, Stuart Scholly, said DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques, a trend Prolexic has been seeing for some time."Instead of using a network of zombie computers, the newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. We believe this approach can lead to the Internet becoming a ready-to-use botnet for malicious actors."The report also found a 47 per cent increase in DDOS attacks compared to the previous year. Prolexic has observed the most abused protocols to be Character Generator (CHARGEN), Network Time Protocol (NTP) and Domain Name System (DNS)."These protocols, which are all based on the User Datagram Protocol (UDP), may be favoured as they allow attackers to hide their identity," the report said."In addition, amplification-based attacks can deliver a massive flood of data at the target while requiring only a relatively small output from the source." New reflection and amplification attack tools can deliver a powerful punch.Q1 saw a 39 per cent increase in average bandwidth and the largest-ever DDoS attack to cross the Prolexic DDoS mitigation network.This attack involved multiple reflection techniques combined with a traditional botnet-based application attack to generate peak traffic of more than 200 Gbps (gigabits per second) and 53.5 Mpps (million packets per second).The report said innovation in the DDoS [marketplace] had given rise to tools that can create greater damage with fewer resources."Q1's high-volume, infrastructure-based attacks were made possible by the availability of easy-to-use DDoS tools from the DDoS-as-a-service [marketplace]," the report said."These tools are designed by malicious hackers to deliver greater power and convenience into the hands of less skillful attackers.
April 23, 2014 1:45:00 PM CEST
Verizon breach report makes case for behavioral analytics – Verizon's annual data-breach investigations report makes a strong case for behavioral analytics technology that looks for anomalies among user activity to spot hackers.Such technology could help detect the use of stolen credentials, which were one of two ways most Web applications were compromised, according to the report released Tuesday. The other way was exploiting a weakness in the application.[More businesses at risk of credit card data breaches: Verizon]In general, Web applications were the "proverbial punching bag" on the Internet, with 35 percent of the more than 1,300 data breaches examined in the report falling into this category.Behavioral analytics software defends against such attacks by establishing a norm for how people access and use a site, whether it's owned and managed by an organization or in the cloud.The technology "automatically builds an internal model of profile variables that describe normal, expected behavior, similar to fraud management techniques," Forrester Research said in a recent report entitled "Top 15 Trend S&R Pros Should Watch: Q2 2014. "Then, if a user exhibits different or risky behaviors, the system automatically monitors, alerts and intercepts the transaction before the user does any damage."Behavioral analytics lets companies place security in the middle of communications between any endpoint and application, said Frank Cabri, vice president of marketing for Skyfence, a cloud security gateway startup recently acquired by Imperva. The software can be configured to monitor individuals or user groups, such as a marketing department."Once you have that profile or that baseline, you're then looking for anomalies," Cabri said.Behavioral analytics tools are increasingly self-learning, according to Forrester. Once the software gathers enough user data, which can take hours or days, a company can then set up alerts and interception capabilities.Such technology is increasingly being used today to protect cloud workloads that are typically running on services in which the provider has control over the security policies, according to Forrester."Increasingly, many vendors apply behavioral intelligence to protect against data exfiltration and mitigate advanced persistent threats," the report said.Vendors to watch in the market include Adallom, CA Technologies, Entrust, Experian, Guardian Analytics, IBM, Imperva, iovation, RSA, Securonix and ThreatMetrix, according to Forrester.[One in five data breaches are the result of cyberespionage, Verizon says]In its report, Verizon advised companies to look for alternatives to single password-based authentication on anything Internet facing. Vendors providing some form of two-factor authentication were quick to add to that recommendation."Using a single-factor authentication process is like laying out a red carpet for them (hackers)," Scott Goldman, chief executive of TextPower, said in an email.
April 23, 2014 1:43:00 PM CEST
Cyberthreats traced to nine attack patterns: Verizon – Nine basic attack patterns constituted 92 per cent of cybersecurity incidents over the last ten years according to the latest report from Verizon.The US telco released the tenth installment of its data breach investigations report (DBIR).Cyberespionage is up in 2014, over three times what it was the previous year. These attacks were more intricate and varied than those in previous years. China remains the world leader in cyberespionage activity. Eastern Europe also had a strong showing with over 20 per cent.Verizon said its security researchers used advanced analytic techniques to discover that 92 per cent of all security incidents over the last ten years can be traced to nine basic attack patterns that vary from industry to industry.The company said that its report will assist organisations in having a more focused and effective approach to combating cyber threats.The report's principal author, Wade Baker, said ten years of analysis made the company realise most organisations were ill equipped to deal with cybercrime."The bad guys are winning. But by applying big data analytics to security risk management, we can begin to bend the curve and combat cybercrime more effectively and strategically.""Organisations need to realise no one is immune from a data breach. Compounding this issue is the fact that it is taking longer to identify compromises within an organisation -- often weeks or months, while penetrating an organisation can take minutes or hours."The nine threat patterns are identified in the report as miscellaneous errors such as sending an email to the wrong person; crimeware (various forms of malware sold as a product to gain control of systems); insider/privilege misuse; physical theft/loss; web application attacks; denial of service attacks; cyberespionage; point-of-sale intrusions; and payment card skimmers.The 2014 report showed an average of three threat patterns encompass 72 per cent of all security incidents in any industry.In financial services, 75 per cent of incidents come from web application attacks, distributed denial of service (DDoS) and card skimming. In manufacturing, 54 per cent are attributed to cyberespionage and DDoS. In retail, the majority attacks are tied to DDoS (33 per cent) followed by point-of-sale intrusions (31 per cent).The report warns that no organisation in any industry is immune to the ever present threat of cyber criminality. No matter how sophisticated a security system, the dynamic and pernicious nature of cyber threats means no organisation can afford to rest on its laurels.
April 23, 2014 1:00:00 PM CEST
An SMS Trojan with global ambitions – Recently, we’ve seen SMS Trojans starting to appear in more and more countries. One prominent example is Trojan-SMS.AndroidOS.Stealer.a: this Trojan came top in Kaspersky Lab's recent mobile malware ТОР 20. It can currently send short messages to premium-rate numbers in 14 countries around the world. But this is not all. Another Trojan, Trojan-SMS.AndroidOS.FakeInst.ef, targets users in 66 countries, including the US. This is the first case we have found involving an active SMS Trojan in the United States.
April 23, 2014 7:48:00 AM CEST
NSA spying revelations have tired out China's Huawei – Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday."It hasn't had much affect on our company's growth, but it's definitely increased our work load," said Huawei's acting CEO Eric Xu.Huawei, a supplier of networking gear, has for years fended off allegations from the U.S. that it secretly spies for the Chinese government. But last year the dispute appeared turned on its head when leaks alleged the U.S. had been secretly spying on China.Not only had the U.S. National Security Agency hacked into Chinese telecommunication companies, but also spied on the communications of Huawei executives, according to documents from former NSA contractor Edward Snowden.During Huawei's global analyst summit on Wednesday, Huawei's Xu said the leaks from Snowden have had "both a good and bad" impact on the company's business, without elaborating. But later added Huawei wants to avoid government disputes, and conduct its own business quietly.Huawei, however, is still facing difficulties in the U.S. market. In 2012, a U.S. congressional panel declared the company a security threat, and asked U.S. companies to buy their telecommunication equipment elsewhere.It prompted Huawei to shift its carrier business away from the U.S., citing "geopolitical reasons."Despite the change, Huawei's annual revenue is still growing. In 2013, the company generated 239 billion yuan (US$38.7 billion) in sales, up 8.5 percent from the previous year. But in North America, Huawei saw a "business slowdown", according to the company's annual report. This led to a 1.3 percent year-over-year decline in sales for the Americas region.For this year, the company plans on raising its investment in research by 14 percent, to about 35 billion yuan. One of the projects it's investing in includes 5G technologies to bring mobile network download speeds to 10 gigabits-per-second.