Windows 10 compatibility

At last the wait is over, Max Secure Software has launched products with Windows 10 compatibility. Right now Max Total Security and Max Secure Anti Virus plus have been updated. Rest of the products will roll out this week or beginning of next week. Now you can update your existing Windows worry free to Windows 10. We have noticed one issue and that is for some people these products get unregistered after update to windows 10 if pre-installed. This is due to changes in the windows registry access rights for the users given by Microsoft for Windows 10, all you need to do is open user interface with “run as administrator” and register one time.

Product Updates will take care of this issue.

On Windows 10 some Firewall components may not work properly as Microsoft has provided limited access to services and drivers to programs. We are working on finding some solution to this issue.

There are many goodies in this bag of updates including Data back up, both automatic and scheduled to safe guard your data files. Highly configurable and intelligently built, this feature will protect your file and you can recover them later from this vault. This will also prevent your useful data from getting infected by Cryptolocker or any other viruses.

Experience, a better, faster Security products for your Windows operating system.

Android-Stagefright vulnerability

A user installs a vulnerable app that contains a remote access backdoor onto their Android device. A remotely-controlled server takes control of this app by exploiting its insecure backdoor. The Stagefright exploit is definitely not a minor problem, and it potentially affects basically any device going back to the early years of Android.

Google issues second patch for Android flaw after first attempt fails. Google is rolling out the Stagefright patch to Nexus devices as promised, but the bigger news alongside that announcement is a new update policy for Nexus devices. Going forward Google will release security patches for Nexus phones and tablets about once per month.

Email Spam-if it is too good to be true…

Email spamming is not behind phishing attacks in any way. Increasingly, e-mail spam today is sent via “zombie networks”, networks of virus- or worm-infected personal computers in homes and offices around the globe. Many modern worms install a backdoor that allows the spammer to access the computer and use it for malicious purposes.

This morning only , a very interesting mail arrived in my inbox which reads like this:

“Good morning my dearest one,
My name is Mrs. Onon Nafi Taroure. I am a banker. It is true that we have not met each other in person, but I strongly believe that no trust or friendship in every business. I have a deceased customer’s abandoned fund, which I am his personal financial adviser before his accidental death and that has being the main reason why I contacted you and i would like to share this information with you in line with this inheritance fund of (USD $19.3 Million Dollars) which you will be rewarded with 39% of the total sum, 9% to the less privilege & charity organization home. Therefore before I disclose the full details to you, I will like to know your interest and willingness to assist me with assurance of trust.

My best regards,
Mrs. Onon Nafi Taroure.
Private Phone number: 00000232322 ”


Dear Readers , I am sure you are getting lot of such emails , but do not respond to them, do not call them , you don’t even need to say “Ha, Ha!!, I know you are fooling me, I do not need any share in $19.3 million dollars !!!”

Increase in phishing attacks

An evolution in the social engineering tactics used to dupe web users to click on the infected URLs or download the malicious documents, with many masquerading as legitimate big-name companies. In total, 30 percent of all identified phishing links led to webpages mentioning ebay, Yahoo, Facebook, Google, and Amazon. The next most common targets included banks and other financial organisations.

Phishing is a kind of malicious attack where cybercriminals create a fake website — meant to look
like a popular online resource (a social network, online banking services, or online games) and use
various social engineering methods to attempt to lure users to the website. Users are tricked into visiting a falsified page of a social network, typically, a phishing page contains text fields for users to enter their personal data. The type of data of interest to the cybercriminals will ultimately determine the type of phishing attack.

Overall, the effectiveness of phishing, combined with its profitability for criminals and the simplicity
of the process, has led to a steadily rising number of these types of incidents. Users have to be careful while filling their personal data in emails , no Bank or institute will ever ask you to send them your personal data.

BYOD: Reward or Risk?

Use of mobile devices such as smartphones, tablets and laptops has seen leaps and jumps this decade. Mobile devices are now equipped with technology that allows a user to be efficient and productive on-the-go. The reward of this being, that employees can access their work tasks on their personal devices and complete them wherever they are. The need for a physical office and an office desktop has lost its value. Employees all over the world are engaging in BYOD(Bring Your Own Device) to work places to quickly and easily complete their work. Enterprise BYOD adoption rates are around 45-75%.

But organizations are concerned over the secure use of these personal devices. BYOD’s pose many business risks. Sensitive and confidential data is usually accessed and saved on these devices, and there are limited ways to track enterprise data access. Banning BYOD’s is not an answer due to the dependency of employees on their personal devices. Appropriate security measures are being implemented by enterprises so as to control malware attacks and security breaches through mobile devices. The graph shows some security policies inculcated by most organizations practicing BYOD.