{"id":1520,"date":"2006-11-14T00:00:00","date_gmt":"2006-11-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/14\/more-security-wares-lined-up-for-vista\/"},"modified":"2021-12-30T11:39:31","modified_gmt":"2021-12-30T11:39:31","slug":"more-security-wares-lined-up-for-vista","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/14\/more-security-wares-lined-up-for-vista\/","title":{"rendered":"More Security Wares Lined up For Vista"},"content":{"rendered":"<p>ESET Software today released NOD32 2.7 of its antivirus software, expanding its capabilities in malware (define) and adding support for Windows Vista.  Despite Microsoft&#8217;s touting of Vista&#8217;s security, ESET said it&#8217;s only a matter of time before malware shows its ugly face on Vista.  &#8220;Out of the box, Vista&#8217;s going to be more secure than Windows XP or anything else Microsoft has released,&#8221; said Randy Abrams, director of technical education at ESET.  &#8220;But like any OS out of the box, users can do a tremendous amount of damage if they want to.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For reasons of clarity, not to mention legal coverage, ESET defines its newest area of coverage as &#8220;unwanted applications.&#8221;<\/p>\n<p>ESET isn&#8217;t the first vendor to jump on board the Vista security bandwagon, despite repeated assurances from Microsoft of its safety and security. GRISOFT, developer of the free AVG security software, has announced its AVG Anti-Virus 7.5 software is available on the Microsoft Windows Security Center for Windows Vista.<\/p>\n<p>http:\/\/www.internetnews.com\/security\/article.php\/3643666<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1520","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1520"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1520\/revisions"}],"predecessor-version":[{"id":4007,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1520\/revisions\/4007"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}