Welcome to Process-info.org library

Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.

Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.

It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.

The Latest News

15 latest global news related to computer security

November 28, 2014 3:08:56 AM CET

Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

 

November 28, 2014 3:08:56 AM CET

Trojan-Spy:W32/FinSpy.A – Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.

 

November 27, 2014 3:08:59 AM CET

Rootkit:W32/Regin – Rootkit:W32/Regin is a complex espionage toolkit used to keep itself and other malicious components from being detected on an infected system. This malware has reportedly been used to target a variety of organizations around the world.

 

November 27, 2014 3:08:59 AM CET

Exploit:SWF/CVE-2014-0515 – Exploit:SWF/CVE-2014-0515 is an exploit for the CVE-2014-8439 vulnerability found in unpatched versions of Adobe Flash Player.

 

November 27, 2014 1:51:00 AM CET

Hateful Westbro Baptist Church Caught Up in Turkey Recall Hoax – We can only hope that, over the last few days, the haters at the notorious Westbro Baptist Church have been kept busy fielding phone calls about virus infected Thanksgiving Turkeys rather than spreading their vile doctrines.

 

November 26, 2014 11:23:49 PM CET

Replace pre-installed antivirus on your Black Friday laptop deal – Black Friday and Cyber Monday abound with deals on laptops. When you purchase a new laptop one of the first things you should do is make sure that it is secure with your choice of antivirus protection. You will probably find that antivirus is already pre-installed, for example, Windows Defender is built into devices that […]

 

November 26, 2014 11:11:26 PM CET

CoinVault Ransomware Jumps on Freemium Model – We have continuously monitored crypto-ransomware’s modifications and evolution since its discovery in late 2013. Though crypto-ransomware  is still relatively “new” to the threat landscape, it has already established itself as a formidable threat to unsuspecting users. By definition, crypto-ransomware shares similar routines with cryptolocker, a refinement of ransomware with file-encryption capabilities. We recently came across two variants […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCoinVault Ransomware Jumps on Freemium Model

 

November 26, 2014 7:12:00 PM CET

PoS malware also targeting ticket vending machines and electronic kiosks – Cybercriminals are using malware designed to steal payment card information from point-of-sale systems to also infect ticket vending machines and electronic kiosks.Security researchers from cybercrime intelligence firm IntelCrawler found a new malware program called d4re|dev1| -- hacker spelling for daredevil -- that is capable of stealing information from multiple PoS systems including QuickBooks Point of Sale Multi-Store, OSIPOS Retail Management System, Harmony WinPOS and Figure Gemini POS."This new strain of malware, which is hitting Mass Transit Systems, acts as an advanced backdoor with remote administration, having RAM scrapping and keylogging features," the IntelCrawler researchers said Wednesday in a blog post.PoS malware has been directly responsible for data breaches at several large retailers over the past two years. After they infect point-of-sale terminals, these malicious programs grab payment card data from their RAM where it is temporarily stored by the specialized software that process transactions.The number of PoS malware threats has grown considerably and the most common attack vector used to infect PoS terminals is weak remote administration credentials that can easily be guessed or brute forced by attackers.The d4re|dev1| malware is also likely distributed in this manner, but according to IntelCrawler, the program also allows attackers to remotely upload files to an infected system. This functionality can be used to either update the malware or to install additional attack tools for lateral movement inside the local network."Serious cybercriminals are not interested in just one particular Point-of-Sale terminal -- they are looking for enterprise wide network environments, having tens of connected devices accepting payments and returning larger sets of spoils to their C2 [command-and-control] servers," the IntelCrawler researchers said.While investigating PoS compromises, IntelCrawler determined that the employees of affected companies commonly violated security policies and used the terminals to check their email, surf the Web, connect to social networks and even play games.Some investigations revealed that cybercriminals also compromised ticket vending machines used by mass transportation systems and electronic kiosks installed in public areas. One infected ticket vending machine was identified in August in Sardinia, Italy, and had been compromised through VNC (Virtual Network Computing), a remote administration protocol."These kiosks and ticket machines don't usually house large daily lots of money like ATMs, but many have insecure methods of remote administration allowing for infectious payloads and the exfiltration of payment data in an ongoing and undetected scheme," the IntelCrawler researchers said.

 

November 26, 2014 5:33:00 PM CET

EU wants Google to apply 'right to be forgotten' delistings to global .com domain – Google should start applying the European Union's "right to be forgotten" to its global, .com domain, European privacy regulators say.European data protection authorities in the so-called Article 29 Working Party (WP29) have compiled a set of guidelines detailing how search engines should apply a court ruling that gave Europeans the right to be forgotten by search engines. As of the May decision, EU citizens have the right to compel search engines to remove search results in Europe for queries that include their names if the results are "inadequate, irrelevant or no longer relevant, or excessive."However, it is not enough to only de-list search results on EU domains, the WP29 said in a news release Wednesday. In order to give full effect to a person's rights as defined in the court's ruling, link removals in search results should be extended to .com domains."Limiting de-listing to EU domains on the grounds that users tend to access search engines via their national domains cannot be considered a sufficient means to satisfactorily guarantee the rights" of a person according to the ruling, the group said. In practice, this means that in any case, de-listing should also be effective on all relevant .com domains in order to prevent circumvention of EU laws.The guidelines, which have not yet been published in full, will probably cause a further escalation of the battle between privacy regulators and Google, as the search engine has so far refused to remove links on its .com domain.Google has been removing links from all 28 EU country domains, as well as from the Google domains in Iceland, Liechtenstein, Norway and Switzerland, countries belonging to the European Free Trade Association (EFTA). Links, however, are not removed from the international, .com domain, as it is clear to the company that other courts in other parts of the world wouldn't have reached the same conclusion as the Court of Justice of the European Union (CJEU), Google's Global Privacy Council, Peter Fleischer, explained last week.Whether Google will change its policy remains unclear. "We haven't yet seen the Article 29 Working Party's guidelines, but we will study them carefully when they're published," a Google spokesman said.The WP29's guidelines also contain a list of common criteria that data protection authorities will apply to handle complaints filed with national offices following refusals of de-listing by search engines. The list contains 13 main criteria that should be applied on a case-by-case basis, and aims to provide a flexible tool to help authorities to make the right decisions.Loek is Amsterdam Correspondent and covers online privacy, intellectual property, online payment issues as well as EU technology policy and regulation for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to loek_essers@idg.com

 

November 26, 2014 4:18:00 PM CET

Hacking Team surveillance malware masquerades as legitimate bookmark manager – A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool.The Detekt tool, launched last week to help users scan their computers for commercial spyware used by governments, has already led to the discovery of previously unknown malware variants, according to security researcher Claudio Guarnieri, who led development for the security app.RCS is sold to law enforcement and other government agencies around the world as a tool for legitimate computer surveillance. Hacking Team claims that it screens its customers, but independent reports suggest that the tool has been used in countries where human rights are poorly protected.It's not clear how the new RCS sample was distributed to users, but it used the Linkman icon and product name, Guarnieri said on Twitter.Outertech, the German software firm that develops the real Linkman program, pointed out that the RCS sample was signed with a digital certificate issued to an entity called Jagdeependra, while its legitimate application is signed with a certificate issued to Outertech."Please make sure the publisher is Outertech when installing Linkman," the company said on Twitter. "It's best you download Outertech products directly from http://outertech.com to make sure you get clean files."The new RCS sample was uploaded to the online scanning website VirusTotal, where as of Monday only two of the 54 supported antivirus engines detected it as malicious.Antivirus company Bitdefender found three files in its database signed with the Jagdeependra digital certificate, which has since been revoked by the issuing certificate authority -- Comodo.One of those files is different than the one announced by Guarnieri, but also uses the Linkman product name and icon. The sample has been in Bitdefender's database since Oct. 14, suggesting that the effort to pass off RCS as Outertech Linkman is over a month old.The third sample is even more interesting, because it masquerades as Realtek NIC Diagnostic Utility, a program developed by chipset manufacturer Realtek Semiconductor.It's not clear at the moment if the fake Realtek NIC Diagnostic Utility is also a variant of RCS or some other malware signed by attackers with the same digital certificate, said Bogdan Botezatu, a senior e-threat analyst at Bitdefender.This sample is also available on VirusTotal, where it was first submitted on Oct. 13.

 

November 26, 2014 1:30:00 PM CET

Kaspersky Lab and European Schoolnet collaborate to help keep 9000 children safe online in 2015 – Kaspersky Lab and European Schoolnet today announced a joint initiative that will increase the amount of support provided to children that have been exposed to cyberbullying in Europe.

 

November 26, 2014 11:51:00 AM CET

Cheap access to the Internet should be a human right: survey – Affordable Internet access around the world should be a basic human right as it is essential for freedom of expression and economic opportunity, according to the results of a global survey released by the Centre for International Governance Innovation (CIGI).The survey was conducted by research company Ipsos with 23,376 Internet users in 24 countries between October 7 and November 12, 2014.Learn how smart CIOs are protecting customers from security breachesResearch was conducted in Australia, Brazil, Canada, China, Egypt, France, Germany, Great Britain, Hong Kong, India, Indonesia, Italy, Japan, Kenya, Mexico, Nigeria, Pakistan, Poland, South Africa, South Korea, Sweden, Tunisia, Turkey and the United States.According to the results, 83 per cent of users surveyed agreed that affordable access to the Internet should be a human right, while 81 per cent said the Internet is important for their economic future and livelihood.CIGI global security & politics program director Fen Hampson said the results show how important the Internet has become for freedom of expression, social communication, knowledge and freedom of association."Right now, one third of the world's population is online but two-thirds of the world's population is not. Unless the rest of the world is brought online, a world of Internet 'have and have-nots' will not only contribute to income inequality, but also stifle the world's full potential for prosperity and innovation," he said in a statement.The survey also asked Internet users about privacy and online monitoring.According to the results, 74 per cent of users were concerned about private companies monitoring online activities and selling the information for commercial purposes.Sixty-two per cent of respondents were concerned about government agencies from other countries monitoring their online activity, while 61 per cent were concerned about their government monitoring them online.Read more:Deloitte launches crisis management serviceTurning to Internet governance, 64 per cent of users were concerned about governments censoring the Internet.In contrast, 47 per cent of respondents said they would trust their own government to play an important role in running the Internet. However, 57 per cent of those surveyed would like to see a combined body of IT companies, engineers, non-government organisations and institutions that represent the interests of citizens play a role in running the Internet.Meanwhile, 48 per cent of users believed their government did a good job of making sure the Internet in their country was safe and secure.The survey also asked users about cyber security. According to the results, 72 per cent of respondents were concerned about institutions in their country being cyber-attacked by a foreign government or a terrorist organisation.Meanwhile, 78 per cent were concerned about a criminal hacking into their personal bank accounts and 77 per cent of users were concerned about someone hacking into their online accounts and stealing personal information such as photos and private messages.According to Hampson, these results highlight that there is a "gaping trust deficit" in the Internet as people around the world worry that their online identities and communications will be compromised or stolen by cyber criminals."Unless trust is restored in the Internet through creative governance innovations its real potential to promote human development and global prosperity will be severely compromised," he said.Follow Hamish Barwick on Twitter: @HamishBarwickFollow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld AustraliaRead More:129 out of 150 A/NZ websites fail Online Trust Alliance auditLack of cyber security investment could backfire on boards: PwC

 

November 26, 2014 10:54:00 AM CET

Many people are still careless when making online transactions, Kaspersky Lab survey shows – According to a survey conducted by Kaspersky Lab and B2B International, nearly a third of users are still careless when making online transactions.

 

November 26, 2014 10:00:37 AM CET

State of Play: Network Devices Facing Bulls-eye – A long time has passed since we published our analysis of threats for home network devices. Since then, the situation has significantly changed - alas, not for the better.

 

November 26, 2014 10:00:27 AM CET

Guidelines for securing your home – Our homes today look more like small offices. We have tons of different devices connected to our network, everything from storage devices and network equipment to wireless network printers.

 
 
 

Navigate through library of processes alphabeticaly by first letter: