*>>**Fwiw, our malware lists are used by a lot of vendors. * Yep. That's a good business to be in.
Hopefully OpenDNS folks will consider your feeds as a source, and we can get the best of both worlds. *ASB *(My XeeSM Profile) <http://XeeSM.com/AndrewBaker> *Exploiting Technology for Business Advantage...* * * On Thu, Sep 16, 2010 at 11:24 AM, Alex Eckelberry < al...@sunbelt-software.com> wrote: > Yes. We have talked with them. I think they are sourcing their malware > lists from some other source. > > > > Fwiw, our malware lists are used by a lot of vendors. Bluecoat networks, > Cisco Ironport, Nominum are all customers of our ThreatTrack malicious data > feeds. > > > > Alex > > > > > > *From:* Andrew S. Baker [mailto:asbz...@gmail.com] > *Sent:* Thursday, September 16, 2010 9:38 AM > > *To:* NT System Admin Issues > *Subject:* Re: #*&$&% "Security Tools" Malware > > > > Hey, Alex > > > > Have you thought about working with the OpenDNS folks to provide enhanced > website security for their service? > > > > This would be a benefit to Sunbelt/GFI customers who are already using > OpenDNS. > > > *ASB *(My XeeSM Profile) <http://XeeSM.com/AndrewBaker> > *Exploiting Technology for Business Advantage...* > * * > > On Wed, Sep 15, 2010 at 1:31 PM, Alex Eckelberry < > al...@sunbelt-software.com> wrote: > > www.Clearclouddns.com > > > > > > > > > > *From:* Jeff Frantz [mailto:jfra...@itstechnologies.com] > *Sent:* Wednesday, September 15, 2010 1:11 PM > > > *To:* NT System Admin Issues > > *Subject:* RE: #*&$&% "Security Tools" Malware > > > > John, > > > > I have not tried it yet but Trend Micro has a free browser add-on which is > supposed protect the browser from infiltrations. It may be worth a try on > one or two PCs where the users are malware magnets. > > > > http://free.antivirus.com/web-protection-add-on/ > > > > -Jeff > > > ------------------------------ > > *From:* John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us] > > *Sent:* Wednesday, September 15, 2010 12:20 PM > > *To:* NT System Admin Issues > *Subject:* #*&$&% "Security Tools" Malware > > > > The “Security Tools” malware is about to drive me insane. My users keep > managing to infect themselves with it, and we’re having trouble stopping it. > > > > They don’t run with admin rights, so there’s no real damage done to their > systems and we can clean it up in about two minutes. But the time adds up, > and I’m tired of my technicians having to waste time on it. > > > > Our antimalware software is Microsoft’s Forefront Client Security, and it’s > having a tough time catching this. Every time I get infected, I send the EXE > to Microsoft and they update their definitions—but the EXE’s used by the > malware apparently change rapidly, and seem to constantly be a step ahead of > FCS’s definitions. > > > > I can think of a couple of options that I know would stop it, like blocking > all EXE’s at our web filter or using group policy to limit the running of > EXE’s—but this would also prevent users from doing things like installing > safe plug-ins from websites, so it’s not a first resort. > > > > Suggestions? > > > > > > > > John Hornbuckle > > MIS Department > > Taylor County School District > > www.taylor.k12.fl.us > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin