Today, we’re introducing something completely new: An unlimited home site license. This will be an option on all of our consumer products.
Here’s the backstory:
Sunbelt is a research-intensive organization — we are constantly doing surveys.
Back in February, we were doing a survey for our upcoming security product, VIPRE (shipping later this month), and our head of marketing noticed something interesting: On average, about 35% of the respondents had more than 3 PCs in their household. (21% responded with three computers, 28% responded with two computers and 17% responded with one computer, out of 1009 respondents, obtained from Sunbelt’s database.)
The lesson was clear: a large group of users out there are getting to a point where a typical 3–user license just doesn’t cut it. That got our marketing head thinking about a whole new idea, taken from the enterprise software space: An unlimited home site license. I really liked the idea.
So, after further discussion and some testing, we’ve formally launched our new Unlimited Home Site License program. All of our consumer products have this in place right now, but it will also be available for VIPRE.
This is an unlimited license — it works for as many computers as you have at home, whether 3, 10, 50 or 100 computers. No guilt, no BS. No limits.
Here’s how the pricing breaks out:
iHateSpam ……………………………………………….. $39.95
CounterSpy……………………………………………….. $39.95
Sunbelt Personal Firewall ………………………….. $39.95
VIPRE™ Antivirus + Antispyware …………….. $49.95
The annual subscription provides protection for unlimited PCs and includes one year of software updates and upgrades, any relevant threat definitions, and live US-based toll-free technical support.
You can read more about the new program here.
Alex Eckelberry
The text on this site promotes a bundle of Vista Premium, OneCare for free, and a book.
I assume that in the US or the EU, bundling the OS with their antivirus product would raise the ire of the gubmint (no, I never hinted at this before).
But the bigger news? It comes in a PINK BOX (with flower petals, of course)!
I think the Symantec team needs to get their Super Sentai fighters ready!
Alex Eckelberry (Thanks Donna)
PC Mag just gave it a rather nice writeup, here.
iHateSpam is the product with which I launched Sunbelt’s security business nearly 6 years ago, so it always has a special place in my heart.
Alex Eckelberry
Typically looks something like this (there are variations).


Jose at Arbor has a writeup on it here, saving me the work.
And poor detection on one sample I picked up (VT).
Alex Eckelberry (Additional thanks to Lance James)
Not major news, but there’s a new Pandex campaign going around (Pandex is a trojan that turns your machine into a spam zombie).
Typical spam email looks like this:
![Pandex123123[1]](http://sunbeltblog.eckelberry.com/wp-content/ihs/alex/pandex123123%5B1%5D_thumb.jpg)
(Image thumbnailed due to offensive content.)
The URL typically points to a compromised site hosting the trojan. The trojan has also been observed as an attachment to the same email.
Virus detection is fairly weak on at least one of the samples we checked. (one sample: VT and Sandbox report).
Alex Eckelberry
As chaos broke out at Heathrow Terminal Five, BA bosses were throwing a party to congratulate themselves on a job well done.
A free buffet, doughnuts and soft drinks were laid on at the T5 Celebration Party as BA managers enjoyed music from a string quartet. Staff were also given boxes of chocolates and commemorative T5 pens.
Meanwhile the new terminal was in meltdown with flights cancelled, bags lost and staff unable to find parking spaces.
And as thousands of passengers faced misery, BA Chief Executive Officer Willie Walsh gave a speech at the party thanking his team for their good work.
Link here.
Alex Eckelberry (hat tip)
Wow.
…the campaign is still up and running, poisoning what looks like over a million search queries with loadable IFRAMES, whose loading state entirely relies on the site’s web application security practices – or the lack of…
And…
USAToday.com, ABCNews.com, News.com, Target.com, Packard Bell.com, Walmart.com, Rediff.com, MiamiHerald.com, Bloomingdales.com, PatentStorm.us, WebShots.com, Sears.com, Forbes.com, Ugo.com, Bartleby.com, Linkedwords.com, Circuitcity.com, Allwords.com, Blogdigger.com, Epinions.com, Buyersindex.com, Jcpenney.com, Nakido.com, Uvm.edu, hobbes.nmsu.edu, jurist.law.pitt.edu, boisestate.edu.
Link here.
Alex Eckelberry (Thanks Francesco)
Interesting article about what apps crash in Vista.
Microsoft (NSDQ: MSFT) wields incredible power in the computer industry. Still, when it comes to the image of its flagship operating systems, it is greatly at the mercy of third-party software developers. When users sit down to use Windows, the code written by Microsoft sometimes doesn’t matter as much as the bugs left behind in poorly written applications and drivers. If a crash does happen, the average user is more likely to blame “that crummy Windows” than to figure out it’s a bug with a device driver.
We rarely get to hear Microsoft’s side of the story on this; it doesn’t want to publicly berate partners about software quality. Occasionally, though, some unvarnished truth gets through. For example, the folks at Ars Technica have been digging around in the Microsoft e-mails released as part of the “Vista Capable” lawsuit. Those e-mails had some revealing information about the causes of Vista woes.
According to the Microsoft e-mails, Nvidia’s drivers alone caused 28.8% of the crashes seen in Vista during the report period. (The report says only that it covers 2007, but it likely does not cover the entire year.) Microsoft drivers come in second at 17.9%, ATI is third with 9.3%, and Intel takes fourth place with 8.8%. Webroot Software, makers of an anti-spyware application, was next with 2.9%. All the other drivers, from hundreds of companies listed on the report, plus “Unknown”, make up the other 32.3% of the crashes.
Link here.
Alex Eckelberry

Here’s a new one: Google Adwords phishing.
According to the folks over at CSIS, the email reads like this:
Dear Google AdWords Customer!
In order to update your billing information, please sign in to your AdWords account at https://adwords.google.com, and submit your billing information. Your account will be reactivated as soon as you have entered your payment details. Your ads will show immediately if you decide to pay for clicks via credit or debit card. If you decide to pay by direct debit, we may need to receive your signed debit authorization before your ads start running, depending on your location. If youchoose bank transfer, your ads will show as soon as we receive your first payment. (Payment options vary by location.)
Thank you for choosing AdWords. We look forward to providing you with the most effective advertising available.
Sincerely,
The Google AdWords Team
More here (no, it’s not transliterated Klingon, it’s Danish). CSIS says these are all fast-flux on Chinese domains.
Alex Eckelberry (Additional thanks to Mike at Shadowserver)

Just for grins and giggles, here’s some new rogue security products designed to extort money from you.
March:
unigray(dot)com spymaxx(dot)com spywatche(dot)com pcprivacytool.com thelastdefender(dot)com thespybot(dot)com spywareisolator(dot)com pc-cleaner(dot)com pc-antispyware(dot)com MalwareWar(dot)com DataHealer(dot)com These can all be removed with the free trial version of CounterSpy.
Alex Eckelberry (Credits: Patrick Jordan, Bharath)
The phish basically says “I’m a student in Abidjan (the Ivory Coast), and I need money for school. Please send it to me.”

(Please, no jokes from French people saying that this will work on Belgians, and vice-versa.)
Alex
Still trying to get my mind around this one:
…one of my close contacts has confirmed there is someone going around either hijacking, hacking or phishing user accounts on Facebook, then randomly uploading pictures of child torture to their funwall…
So far, I have one definite confirm on at least two accounts that were taken over (most likely by the same individual), one of which had the child torture pictures uploaded to it and the other – well, it wasn’t child torture but it nearly cost someone their marriage, according to my friend.
Link here.
Paperghost (the author) just updated me with this:
apparently the pics were placed on the hacked accounts funwall, which of course means anyone would see the pics simply by visiting the profile, instead of having to navigate to the albums
So far, no confirmation or screen shots.
If true, this is very messed up.
Alex Eckelberry
Follow-up to my previous blog entry:
In what must be the fastest turnaround in corporate history, Abary told me that the $49.99 charge is dead. “We didn’t intend that to happen,” he said, blaming the snafu on an internal miscommunication. “We’re removing the $49 charge,” he told me. Beginning this spring and rolling out to all products through the end of the year, there will be no charge to order a custom-configured Sony VAIO computer, and you will be able to opt out of every trialware application, without exceptions.
Link here.
Good for them.
(Now, see if you can say this post’s headline 10 times perfectly.)
Alex Eckelberry (Thanks Angus)
No news in having another trojan doing typical host redirects, but in this case, we found the use of Google’s name to be mildly interesting: A new variant of Trojan.Delf from the Loadscc gang changes your host file to redirect to a fake Google page. The fake Google page pushes a SpywareIsolator, a rogue antispyware program.
O1 – Hosts: 124(dot)217(dot)251(dot)147 google.dk O1 – Hosts: 124(dot)217(dot)251(dot)147 google.se O1 – Hosts: 124(dot)217(dot)251(dot)147 google.co.nz
and so on…

Resulting infection if one follows the suggestion above:

Alex Eckelberry (Thanks Patrick Jordan)
Sony launches a new option, which will give you a $50 discount on your purchase if you choose to crapify it. On Engaget, here.
In other words, they’re charging $50 to not crapify your computer.
I have a Vaio and actually really like Sony product. However, someone has their head screwed on backward to think this idea is going to fly. It shows such a complete disconnect from the market.
Sony got a good start appealing to enthusiasts, with beautiful hardware design. But I can only imagine some freshly-minted MBA product manager coming up with this brilliant idea to “monetize” crapware. I hope that same bozo who thought up this absurd idea will be so fired.
Of course, there’s always the free PC Decrapifier. But that doesn’t beat a clean machine to start.

Alex Eckelberry (Thanks Robert)
A relatively new naughty little worm courtesy of Seedcorn Advertising (IM-Worm.TopInstalls.A) does nothing noticeable upon infection, but if you’ve got ICQ, Yahoo IM, AIM or MSN Messenger, it automatically sends all of your buddies a link to an installer for a full infest of bundled adware/malware from our dear friends at.
Example:

Alex Eckelberry (Thanks, Patrick Jordan)
CNET does a first peek at the beta, here. And a user review here.
Feel free to join our beta, by going to beta.sunbeltsoftware.com. We need all the testers we can get to pound out the bugs.
So Spitzer did some naughty stuff and got caught.
Sad, pathetic, and stupid.
I’m not a big Spitzer fan boy. I’m disturbed at the “take no prisoners” actions that occurred on Wall Street. Yes, there were real problems and illegalities there that needed fixing, but one could argue that some bad may have actually come of it.
However, there are a couple of comments I’ll add to the general melee over his resignation:
1. He was the first AG to go after adware companies, serving as an inspiration to other law-enforcement agencies (including the FTC). One could argue that the work behind this was Justin Brookman’s (Brookman worked for Spitzer as an Assistant AG), but needless to say, Spitzer was the boss in charge.
In the same vein, his agency provided wonderful fodder for this blog with published internal paperwork and emails showing criminal acts by Direct Revenue.
The work he did in this area (and Brookman’s) is commendable.
2. A critical and potentially very scary back-story may be that, as USC professor Jon Taplin alleges, this is the first big public example of NSA’s domestic wiretapping program.
From a WSJ article on this program (via Taplin):
The central role the NSA has come to occupy in domestic intelligence gathering has never been publicly disclosed. But an inquiry reveals that its efforts have evolved to reach more broadly into data about people’s communications, travel and finances in the U.S. than the domestic surveillance programs brought to light since the 2001 terrorist attacks.
Alex Eckelberry
|