GT500 Posted November 11, 2009 ID:156200 Share Posted November 11, 2009 :) ATTENTION, IOBIT IS HOSTING THEIR STOLEN SECURITY CRAPWARE ON THIS WEBSITE: http://www.techspot.com/downloads/3580-iob...curity-360.htmlTime to post a cease and desist letter to Techspot methinks? :) :)Until they remove the download, I would ask that users who wish to get involved please avoid going any farther than leaving a bad review and a link to the announcements.Thank you. Link to post
russellsmith1985 Posted November 11, 2009 ID:156423 Share Posted November 11, 2009 Until they remove the download, I would ask that users who wish to get involved please avoid going any farther than leaving a bad review and a link to the announcements.Thank you. I wasn't impying that it was going to be ME that was going to send a cease and desist lol , I was saying it as a suggestion of what Malwarebytes should do. Link to post
wildman Posted November 11, 2009 ID:156487 Share Posted November 11, 2009 Sent an email asking that they remove all IoBit products from their listings, have not received a reply. Noticed from the avatars that they all appear to be rather young guys, so we shall see what if any reply is forthcoming. Put the pressure on folks, but do so in a nice polite professional manner.ThanksWildman Link to post
zaphod Posted November 11, 2009 ID:156610 Share Posted November 11, 2009 Too many copyrighted works that would need to be paid for.Also, most legit companies are too busy trying to fight malware to add all of those bells and whistles. When you have very little need to research and develop your own technologies, you can add all of that stuff to your software.Actually, musing on this, it would be nice if the legit companies formed a union and shared research, and detection information, but did not share detection engines, or removal systems.This would at least allow for rapid detection of new threats by any member company, but still keep competition going regarding accuracy of detection engines, and speed of said engines. Also the ability to remove said problems would be distinct and unique to each member company. Thus, the best still win. If anything, it would allow for more man-hours to be dedicated to more threats.Of course, membership in such a group would be voluntary, and subject to peer review, and not just grabbing and going like 2-bit. (Yes, 2 bit, not 10bit. Because there are 10 kinds of people who understand binary, those who do, and those who don't.)In analogy... Alot of countries fought the same Nazis in WWII, and shared information on the enemy, and how to find them, however, all of them brought their own equipment to the fight, and their own strategies on how to best deploy it.Zap Link to post
nccomp Posted November 12, 2009 ID:156728 Share Posted November 12, 2009 Actually, musing on this, it would be nice if the legit companies formed a union and shared research, and detection information, but did not share detection engines, or removal systems.This would at least allow for rapid detection of new threats by any member company, but still keep competition going regarding accuracy of detection engines, and speed of said engines. Also the ability to remove said problems would be distinct and unique to each member company. Thus, the best still win. If anything, it would allow for more man-hours to be dedicated to more threats.Of course, membership in such a group would be voluntary, and subject to peer review, and not just grabbing and going like 2-bit. (Yes, 2 bit, not 10bit. Because there are 10 kinds of people who understand binary, those who do, and those who don't.)In analogy... Alot of countries fought the same Nazis in WWII, and shared information on the enemy, and how to find them, however, all of them brought their own equipment to the fight, and their own strategies on how to best deploy it.Zap Link to post
nccomp Posted November 12, 2009 ID:156733 Share Posted November 12, 2009 The problem of sharing or pooling resorces is human nature. Individual companys get lazy and start relying on the collective instead of doing their own work. In the end everyone would ends up worse off.Its one of those things that sounds good in theory but usually does not would in practice.PS: Sorry for my previous blank post. A screw up on my part. Link to post
DragonMaster Jay Posted November 12, 2009 ID:156748 Share Posted November 12, 2009 ^^ Not exactly. I hope I can respond, since your post is not clear.If what you mean that companies do not do their own work anymore, that is not all the way true.Malwarebytes does their own database, Avira does their own database, AVG does their own database, Avast - Ikarus - Kaspersky and many more do their own.However, some companies do not, but have permission to pool in the database in to their own small engine to help them get started or to boost their own engine. For example, Emsi Software has their own database but also uses the Ikarus scanning engine as a booster. But, ClamWin pools in the ClamAV database as their engine - the only thing they did was change up or re-create the GUI (graphic user interface) and distribute it. Then, you get to companies that do not ask for permission. Usually rogue software does these tasks. IOBit decided to pool in the Malwarebytes database and boost their own, without permission. They are now rogue. IOBit has pooled in several other databases, which have not been said.It goes, "for every excellent security software, there will be a bunch of rogues copying because they cannot do the work themselves." Link to post
Madness423 Posted November 13, 2009 ID:157462 Share Posted November 13, 2009 took a look at io site today.. they locked their board http://forums.iobit.com/showthread.php?p=29439#post29439 Link to post
exile360 Posted November 13, 2009 ID:157473 Share Posted November 13, 2009 From here:2. Until now, there is NO any convincing proof to show Malwarebytes' fallacy. We ask Malwarebytes immediately stop spreading malicious rumors for hyping itself by IObit. We have many independent and objective reviewing tests and reports from 3rd parties. Any one can download and view them from this link: http://forums.iobit.com/forumdisplay.php?f=25. Or any one can perform a comparing test to see which anti-malware is superior. By its own database and advanced detection technology, IObit Security 360 scans faster, detects and removes more malware than any other anti-malware vendors, including Malwarebytes. Why a superior vendor need steal database from a lower-class one? 3. For the sake of avoiding disputes and possible problems in malware naming, we have deleted all disputed items in our database temporarily and updated IObit Security 360 Link to post
nosirrah Posted November 13, 2009 ID:157478 Share Posted November 13, 2009 One of the things I keep close tabs on is malware that has both an active source and is polymorphic . I segregate these samples so that I can pay closer attention to them as these are the ones most likely to harm our users . Here is how IOBit is currently doing against these threats (all pulled from web between Oct. 13 and today) :IObit Security 360OS:Windows XPVersion:1.2.0.10Define Version:1279Time Elapsed:00:00:02Objects Scanned:845Threats Found:51|Name|Type|Description|ID|TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\1(4).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\CartoonPorn-Movies.40054(1).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\cb(2).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\cb15(1).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_player.45174(2).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_player.45174(3).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_stream-viewer.v.40000(1).exe, 11-4906Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install(129).exe, 11-242TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48300(1).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48413(1).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48428(2).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48428(3).exe, 11-4906Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\spyware(5).exe, 11-242Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\spyware(7).exe, 11-242Refpron.AA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\svc(19).exe, 11-5599Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\svchost(10).exe, 11-242TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40000(1).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40064(2).exe, 11-4906TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40064(3).exe, 11-4906Trojan.Cript.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\win(1).exe, 11-345Kryptik.AWD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\av-scanner.0.exe, 11-5298TrojanDownloader.Agent.PME, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\load(12).exe, 11-2713Kryptik.AVM, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\update_for_media_player_(KB972036)(2).exe, 11-6233Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(12).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(2).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(20).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(22).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(23).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(24).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(25).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(26).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(27).exe, 11-3086Kryptik.AMH, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(36).exe, 11-4188Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(4).exe, 11-3086Kryptik.AMH, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(40).exe, 11-4188Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(5).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(6).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(7).exe, 11-3086Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(9).exe, 11-3086Kryptik.AUQ, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses28\pp.12.exe, 11-2836Kryptik.AXJ, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses29\spyware(7).exe, 11-888BHO.NTG, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses30\jrTT.exe, 11-1412Injector.ADN, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses30\Resume.exe, 11-2283TrojanDownloader.Sality, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses31\llllload.exe, 11-1387Injector.AEL, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses32\1(7).exe, 11-4267PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses33\aa2(1).exe, 11-1286PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses34\aa4(5).exe, 11-1358PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses34\new6(9).exe, 11-1358Suspicious Malware_Heur, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses37\setup(93).exe, 8-17Injector.PO, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses38\wetin.exe, 11-2656PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses42\39.exe, 11-128651/845 = 6% Link to post
evilfantasy Posted November 13, 2009 ID:157482 Share Posted November 13, 2009 The Latest Declaration from IObit Link to post
Kenny94 Posted November 13, 2009 ID:157502 Share Posted November 13, 2009 I see IObit is playing the victim. They got caught (period). Also, I do not see their developers in the trenches with us. Link to post
memoemc2 Posted November 13, 2009 ID:157514 Share Posted November 13, 2009 here I go:I don't pretend to be offensive with the Chinese people but they know already the facts that several times these affect themselves:-no law about intellectual property.-law depends of the money they have and/or political influence.-labour force brutal exploitation (low payment and long working schedules) -no democracyStealing intellectual property is a matter of everyday, it happens with thousands of brands and nothing happens. One of my best friends is a Chinese guy who is the son if a wealthy businessman. I met him at Uni in Melbourne down under; and one day he told me: my dad makes fakes of Tommy Hilfiger and Nike products, he has a team which copies everything from catalogs. He told me that was normal in China. Even more, he was disgusted as raw workers were treated and paid; he wanted to stay downunder to begin a new life far from his dad and the injustice.I just called him to talk about this topic and he told me: "of course mate they are stealing". He promised me to make some inquires about; later I'll tell you all about it.So, common sense and logic says: Iobit steals, and no just from Malwarebytes, I'm sure from many more. I have been reading some reviews about its performance was good... of course stealing from several companies. If they did it with one they do it to everybody.Malwarebytes is a small giant which has defeated the anti virus heavyweights, smart users know that, people like paris hilton keeps using suckton.... ups sorry norton, mcafee, trendmicro etc.KEEP BACKING UP MALWAREBYTES, SCREW THE CHEATERSTO THE MALWAREBYTES PEOPLE: KEEP THIS LEVEL OF EFFICIENCY BECAUSE THE LOYALTY EXPOSED HERE IS THE RESULT OF YOUR EXCELLENT PRODUCT AND SERVICEThank you,memo Link to post
exile360 Posted November 13, 2009 ID:157535 Share Posted November 13, 2009 Ok, I just started playing around with IOBit 360 (latest version 1.2) and I must say I'm impressed :It steals from the functionality of HijackThisIt steals from the functionality of Malwarebytes' Anti-Malware, including FileASSASSIN ("Unlock Delete")It steals from Spybot Search & Destroy/SpywareBlaster with it's "Passive Defense" functionalityIt steals from Secunia PSI with it's "Security Holes" checkerIt steals from CCleaner (even the user interface looks the same) with its "Privacy Sweeper"I'll be checking out Advanced System Care later to see what legitimate tools it mimics. Link to post
SpySentinel Posted November 13, 2009 ID:157554 Share Posted November 13, 2009 They look for help from other vendors now, instead of just going out and stealing them, how thoughful of them to ask now.Also, like Kenny94 said, why are their analysts not out in the field. Link to post
DragonMaster Jay Posted November 13, 2009 ID:157666 Share Posted November 13, 2009 The Latest Declaration from IObitThanks for the link...I think the following is a joke:And we also paid special attention to questions regarding the old database of IObit Security 360 among the feedback.Hah, yeah right...they avoided the situation.We have apologized for all the inconvenience, meanwhile, we have taken immediate actions to remove all disputed data and updated the whole database online on November 3.Is this completely true?Eventually, IObit would like to work with all anti-malware vendors, to enhance the overall evolution of malware detection...Are they going to steal, or ask permission?--------I see IObit is playing the victim. They got caught (period). Also, I do not see their developers in the trenches with us.They are not very strong apparently.---------They look for help from other vendors now, instead of just going out and stealing them, how thoughful of them to ask now.Also, like Kenny94 said, why are their analysts not out in the field.lol, like I said above...Are they going to steal, or ask permission? Link to post
MBAM-is-the-BOSS Posted November 14, 2009 ID:157741 Share Posted November 14, 2009 What can I say? IObit has really dug itself into a hole here. Not only are they stealing database information that good, reliable people worked on day in and day out at Malwarebytes, but they are also stealing from multiple other countries! Not to offend the Chinese people, but if they had more restrictions on this kind of stuff then justice would be served. I've spread the word around my entire company that no one should use IObit. 15 people in my office have it! I suggest everyone to tell everyone they know not to get any IObit stuff, and explicitly explain why. Malwarebytes belongs at the top of the food chain in computer security, and they don't steal! Link to post
Triple Helix Posted November 15, 2009 ID:158037 Share Posted November 15, 2009 There so many new Anti-Malware programs out there as we all can see and I only use the ones the Malware fighters use because they know what is best to clean up an up an infected machine! Who in there right mind would suggest to install IOBit to clean an infected machine not me!! Right? TH Link to post
DragonMaster Jay Posted November 15, 2009 ID:158045 Share Posted November 15, 2009 Exactly. I would not. lol Link to post
MBAM-is-the-BOSS Posted November 15, 2009 ID:158287 Share Posted November 15, 2009 I had it for a while lol. Actually, a highly respected Hewlett-Packard worker i know recommended it to me, until we realized what they were doing to other companies. Never using it again! Go mbam Link to post
DragonMaster Jay Posted November 15, 2009 ID:158299 Share Posted November 15, 2009 I already have an optional canned speech for IObit that I am using for the users I help. lol Link to post
russellsmith1985 Posted November 16, 2009 ID:158362 Share Posted November 16, 2009 IOBIT HAS A NEW LINK TO THEIR STOLEN SOFTWARE, THE ADMINS MAY WANT TO EMAIL A CEASE AND DESIST LETTER TO WIKISEND.COMIobit thieves, as soon as one link gets taken down another one pops up Link to post
Amethyst Posted November 16, 2009 ID:158369 Share Posted November 16, 2009 Can someone de-live that link or whatever you do, since it goes right to an .exe? Oh... Someone's quick, that got done while I was hitting the 'submit' button. Link to post
DragonMaster Jay Posted November 16, 2009 ID:158370 Share Posted November 16, 2009 At least IObit is out of the most popular download sites, right? Link to post
Rednose Posted November 16, 2009 ID:158433 Share Posted November 16, 2009 At least IObit is out of the most popular download sites, right?Nope, it's back on MajorGeeks http://www.majorgeeks.com/IObit_Security_360_d6088.htmlGreetz, Red. Link to post
Recommended Posts