magnify
formats

Soniq Smashes the Price Barrier on Large Screen, Full High Definition, LCD Televisions

Sydney, Australia – March 15, 2010 – Soniq has today delivered on their commitment to offer affordable and user-friendly large screen televisions by offering their price breakthrough of $798 for a 40″ Full HD 1080p LCD TV and $1198 for a 46″ Full HD 1080p LCD TV.

The large model televisions, sold at JB Hi-Fi stores throughout Australia, are offering prices substantially lower than competitors on Full High Definition displays. This price breakthrough means quality large model televisions are no longer confined to a select few buyers and Soniq is pleased to deliver on this.

“Soniq is delighted to be able to offer its customers quality products at the lowest prices. With our latest price breakthrough we’re offering Australians the opportunity to buy and own a large TV previously thought to be unaffordable. We have models that come in Full High Definition, never before seen at this price level.” said Dominic Neo, Business Development Manager, Soniq Australia.

In this latest range Soniq is offering two Full High Definition LCD TVs, the QSL400XT and the QSL460XT, all with quality design and features you’ve come to expect.

Soniq QSL400XT
The 40 inch Soniq QSL400XT features full 1080p high definition resolution advertised for a “so cheap!” $798 at JB Hi-Fi stores. The television is tastefully framed with a glossy black border and matched with features such as HDMI input and built in high definition tuner. Also included is an Ultra High Resolution Panel WXGA to complement the resolution and offer superior display. The Soniq QSL400XT is perfect for young couples or movie lovers that want an all-rounder offering quality, design, size and price.

Model Number Soniq QSL400XT
•    Screen Size 40” (101 cm)
•    Resolution 1920 x 1080 pixels
•    Contrast Ratio 3000:1
•    Brightness (cd/m2) 500
•    Support Color 16.7M
•    Response Time (ms) 8
•    Audio Output 8W+8W
•    Audio Stereo Type NICAM Stereo
•    Dimension ( L x W x H ) (mm) 1065 x 380 x 800
•    Weight (KG) 27
•    Power Supply AC 100 – 240V @ 50/60Hz
•    Power Consumption Max. 200W, Standby < 1W
Other Features:
• Built-in HD Digital (DVB-T) Tuner
• Ultra High Resolution Panel WXGA
• HDMI x 3, Input TV antenna, S-Video, PC, Composite x 1, Component x 2

Soniq QSL460XT
Like its little sister the QSL400XT, the Soniq QSL460XT LCD television, offers full 1080p high definition resolution and an Ultra High Resolution Panel WXGA for complete viewing pleasure. The QSL460XT is Blu-Ray ready and features 3 HDMI inputs and high definition digital tuner.  With ample screen size of 46 inches and a price under AU $1200 the Soniq QSL460XT is the best value LCD in the market today. The QSL460XT has a stunning contrast ratio of 2000:1 and a response time of 15ms.

Model Number Soniq QSL460XT
•    Screen Size 46” (117 cm)
•    Resolution 1920 x 1080 pixels
•    Contrast Ratio 2000:1
•    Brightness (cd/m2) 500
•    Support Color 16.7M
•    Response Time (ms) 15
•    Audio Output 8W+8W
•    Audio Stereo Type NICAM/A2 Stereo
•    Dimension ( L x W x H ) (mm) 1215 x 380 x 900
•    Weight (KG) 39.5
•    Power Supply AC 100 – 240V @ 50/60Hz
•    Power Consumption Max. 280W, Standby < 1W
Other Features:
• DVB-T Digital TV
• Compatible HD Signal Input: 720p, 1080i, 1080p
• HDMI x 3, Input TV antenna, S-Video, PC, Composite x 1, Component x 2

Product Pricing and Summary
Vendor: Soniq
Model:  QSL400XT, QSL460XT
RRP:  
QSL400XT: AU $798
QSL460XT: AU $1198
Website: http://www.soniqav.com/index.html
Distributors:  JB Hi-Fi nationwide
Customer Care Hotline: 1300765663
Availability: Now

About Soniq
Soniq is a supplier of consumer electronics. Headquartered in Australia, the company has had great success in marketing quality products into Australia. The versatility and variety of Soniq’s product solutions is unequalled.
In the consumer market, the reliability and reputation of Soniq products has ensured that they are part of the everyday lives of many Australians and now New Zealanders – from audio visual products such as TVs and hi-fi systems, to lifestyle products such as digital cameras and CD/MP3 players. Soniq has had great response from consumers. Over the years, Soniq has been working hard to fine tune products in line with market trends, to ensure they continue to provide quality products that are affordable to all consumers.

 
formats

WD® Introduces Fast and Rugged Solid State Drives for Notebooks and Desktop PCs

Sydney, Australia: March 15, 2010 — WD® today announced that the company is shipping its first consumer-oriented solid state drive (SSD) with the new WD SiliconEdge™ 2.5-inch SSD family. WD SiliconEdge Blue™ SSDs offer fast read/write speeds and high SSD capacities, making them an ideal storage solution for read-intensive applications requiring high performance and plug-and-play compatibility.
    
WD SiliconEdge Blue SSDs, in capacities up to 256 gigabytes (GB), feature a native SATA 3.0 gigabits per second (Gb/s) interface with read speeds up to 250 megabytes per second (MB/s) and write transfer rates up to 170 MB/s. Fast and rugged, WD SiliconEdge Blue SSDs accelerate application performance and deliver maximum tolerance for drops, shock and vibration along with silent and low-power operation.
   
“The development of the WD SiliconEdge Blue product family leverages WD’s extensive experience in designing and manufacturing highly reliable storage products and the company’s worldwide sales and distribution network to accelerate SSD technology adoption by OEMs, technology enthusiasts, gamers and road warriors,” said Michael Hajeck, senior vice president and general manager of WD’s solid state storage business unit. “Customers who demand the ultimate in performance will find the WD SiliconEdge Blue SSDs exceed all their requirements.”
    
The new WD SiliconEdge Blue product family has passed WD’s extensive functional integrity testing procedures, which subjected the WD SiliconEdge Blue SSDs to over 250, 000 hours of testing to ensure they meet the industry’s highest data integrity, reliability and compatibility standards. Designed for both read-intensive client/consumer applications and write-intensive, 24/7 OEM applications, WD’s new multi-level cell (MLC) -based SSDs feature patented and patent-pending technologies, such as advanced wear-leveling and error correction control, as well as TRIM and NCQ (Native Command Queuing) command support to ensure maximum drive performance and endurance with easy plug and play compatibility.

Price and Availability
Manufacturer: Western Digital
Product Name: WD SiliconEdge Blue
RRP:
WD SiliconEdge Blue SSD 64 GB (model SSC-D0064SC-2100)   AU$ 349, NZ$ 459
WD SiliconEdge Blue SSD 128 GB (model SSC-D0128SC-2100) AU$ 649, NZ$ 869
WD SiliconEdge Blue SSD 256 GB (model SSC-D0256SC-2100) AU$ 1,229, NZ$ 1,629
Website: www.westerndigital.com
Warranty: Three-year limited warranty
Availability: Now   
    

About WD
WD, one of the storage industry’s pioneers and long-time leaders, provides products and services for people and organizations that collect, manage and use digital information. The company designs and produces reliable, high-performance hard drives and solid state drives that keep users’ data accessible and secure from loss. Its advanced technologies are configured into applications for client and enterprise computing, embedded systems and consumer electronics, as well as its own consumer storage and media products.
    
WD was founded in 1970. The company’s storage products are marketed to leading OEMs, systems manufacturers, selected resellers and retailers under the Western Digital® and WD brand names. Visit the Investor section of the company’s Web site (www.westerndigital.com) to access a variety of financial and investor information.

 
formats

AWARD-WINNING DJ HERO™ SOUNDTRACK TO EXPAND WITH NEW EXCLUSIVE DOWNLOADABLE MIXES

Sydney, AUSTRALIA. March 12th 2010 – Joining the critically-acclaimed, 93 original mix soundtrack on DJ Hero™ – the #1 new videogame intellectual property of 2009 – are chart topping hits from hip-hop legends and DJ Hero Renegade Edition headliners, JAY-Z and Eminem. Starting March 18, 2010, living room DJ’s can mix, scratch and battle with the JAY-Z vs. Eminem Mix Pack, featuring the following exclusive mash-ups:

“Shake That” by Eminem Mixed With “Show Me What You Got” by JAY-Z

“Without Me” by Eminem Mixed With “Encore” by JAY-Z

“Can I Get A…” by JAY-Z Mixed With “Lose Yourself” by Eminem

The JAY-Z vs. Eminem Pack will be available on Xbox LIVE® Marketplace for the Xbox 360® video game and entertainment system from Microsoft on March 18, 2010 for 640 Microsoft Points and on the PlayStation®Store for the PLAYSTATION®3 computer entertainment system on March 25, 2010 for $12.95. All mixes will be released as downloadable singles for Wii™ on March 25, 2010 for 300 Wii Points each.

The DJ Hero Extended Mix Pack 01, featuring two party rockin’ grooves: 50 Cent featuring Mary J. Blige “All Of Me” mixed with Queen’s “Radio Ga Ga” and “DARE” by Gorillaz vs. Public Enemy’s “Can’t Truss It;” and the David Guetta Mix Pack 01 containing remixes of his hot tracks “When Love Takes Over” featuring Kelly Rowland, the chart-topping “Sexy Chick” featuring Akon and “On The Dance Floor” featuring will.i.am and apl.de.ap of the Black Eyed Peas; are available now. For information on how to connect your console and access DJ Hero downloadable content, please visit: http://www.djhero.com/support/.

The #1 new videogame intellectual property by revenue in the U.S. and Europe for calendar 2009, according to The NPD Group, Charttrack and GfK, DJ Hero delivers an all-new interactive music experience that allows players to start the party and not only experience, but to hear music in an all-new way. Featuring mixes created by DJ AM, Cut Chemist, Grandmaster Flash, DJ Jazzy Jeff, J. Period, DJ Shadow, DJ Z-Trip and more, spinning over 100 individual songs, highlighted in 93 unique never-before-released mixes that blend genres of music, including hip-hop, pop, rock and dance, DJ Hero delivers the most diverse and international collection of music ever assembled in a music game by incorporating anthems from legendary artists. Created exclusively for DJ Hero, the turntable controller immerses fans into DJ culture and a sea of music as they utilize and master various DJ techniques including scratching, crossfading and sampling, while leaving room for creative expression with a variety of effects and player chosen samples and scratches, transforming a face in the crowd into the life of the party.

The DJ Hero Renegade Edition includes a copy of the game, a premium Renegade turntable controller, hardshell turntable carrying case that converts to a performance-ready DJ stand, and an exclusive JAY-Z and Eminem 2-CD pack featuring “best of” and new, unreleased material.

Available now, DJ Hero was developed by FreeStyleGames for the Xbox 360® video game and entertainment system from Microsoft, the PLAYSTATION®3 and PlayStation®2 computer entertainment systems and the Wii™ system from Nintendo.

For more information about DJ Hero, please visit djhero.com, facebook.com/djhero and twitter.com/djhero.

About Activision Publishing, Inc.

Headquartered in Santa Monica, California, Activision Publishing, Inc. is a leading worldwide developer, publisher and distributor of interactive entertainment and leisure products.

Activision maintains operations in the U.S., Canada, the United Kingdom, France, Germany, Ireland, Italy, Sweden, Spain, Norway, Denmark, the Netherlands, Australia, Russia, Japan, South Korea, China and the region of Taiwan. More information about Activision and its products can be found on the company’s website, www.activision.com.

 
formats

BitDefender® issues protection against vulnerabilities in Internet Explorer® 6 and 7

SYDNEY & AUCKLAND – 12 March 2010 – BitDefender® today has released an emergency update to protect users against a newly-discovered vulnerability in versions 6 and 7 of Internet Explorer®. Microsoft® has detailed the attack scenarios in security advisor #981374, announcing that a patch is being made in order to mitigate the vulnerability.

Users running versions 6 and 7 of Internet Explorer can become infected by simply visiting a specially crafted web page that uses a highly obfuscated JavaScript code to create a use-after-free error, such as a pointer being accessed after the deletion of an object.

Since Internet Explorer® 8 is not vulnerable to the attack, the next logical step would be to upgrade immediately. However, many custom-made applications in the corporate environment are strongly interconnected with IE 6 or IE 7 and might not work as expected on Internet Explorer 8.

Anatomy of the attack

Initially, the user is lured into visiting a specially crafted web link advertised either via spam messages or from a post on a forum or social network. The respective webpage contains JavaScript code obfuscated using the escape function. In order to bypass detection from various antivirus products, the script calls a secondary JavaScript that replaces a variable with the unescape string.

The decrypted result is actually the malicious payload which will trigger a heap spray attack and will write the malicious code into the browser’s User Data area, making it persistent: every time the browser starts, the malicious code is executed without any subsequent intervention (drive-by download), which will result in the automatic download of a file called either notes.exe or svohost.exe (detected by BitDefender as Gen:Trojan.Heur.PT.cqW@aeUw@pbb).

This approach is similar to the one described in CVE-2010-0249 that has been used in targeted attacks against 34 major corporations including Google™ and Adobe™.

Mitigating the risks

BitDefender is currently detecting the exploit and blocking the malicious code before inflicting any damage to the computer. Moreover, all BitDefender customers have been proactively protected against the infected binaries the exploit is trying to install on the local machine.

In order to stay safe, BitDefender recommends that you download, install and update a complete antimalware suite with antivirus, antispam, antiphishing and firewall protection and to manifest extra caution when prompted to open files from unfamiliar locations.

 
formats

New True Crime Scenes (Screenshots)



 
formats

INTENSE HIGH-SPEED ACTION IN ROCKET RACING FOR PLAYSTATION MINIS RELEASED TODAY

March 11th, 2010 – Today Halfbrick is proud to announce the release of its fourth PlayStation mini! Take to the sky-high tracks with speed and precision in Rocket Racing, which challenges your reflexes and daring across 24 levels in Grand Prix, Challenge and Quick Race events. Drive like a true prodigy by mastering advanced drifting and wall-boosting techniques to get an edge over your opponents and achieve record times. Rocket Racing is intense action from the green light to the finish line!

Rocket Racing puts players in the sub-stratosphere on tracks suspended above the clouds and futuristic cities. Challenge mode features six tiers of unique racing and skill-based challenges, often featuring the signature “grinding” technique which is critical to achieving elite racing success! By adjusting the orientation of the racer against the walls, players can use rocket power to boost off at high speed as well as scoring points for longer and smoother grinds.

Grand Prix pits players against opponents in a series of races over four difficulty levels. Completionists can collect gold trophies as they race, and along with the Challenge mode, take steps to unlocking and winning every event in the game for the elusive 100% Award!

Finally, Party Mode puts up to four players in the hotseat as they take turns setting and breaking each other’s score on a huge variety of tracks. Party Mode even lets players customize how to win – be it with the fastest time, highest total or single grind score!

Rocket Racing is released on March 11th worldwide, playable on PS3 and PSP minis, available on the PlayStation Store for US$4.99.

Debut trailer – http://www.youtube.com/watch?v=qvlusxXNQbk

 About Halfbrick

Halfbrick is a professional game development studio based in Brisbane, Australia. Founded in 2001, it has developed popular titles for the Game Boy Advance, PSP, PlayStation 2 and Nintendo DS, with expansion into XBLA, PS3 and iPhone development. For further information, please visit www.halfbrick.com and follow on Twitter, Youtube and Facebook!

 
formats

After its successful debut on PSP Minis arcade casual Fortix goes PC and will be directly downloadable from Steam.

BUDAPEST, Hungary — March 12, 2010 — First there was only the extreme version of Fortix dedicated for hardcore gamer audience grown up on the 80’s arcade classic Qix. Then the PSP owners asked for something more casual. They have it by now. On the 18th of March an improved PC version of Fortix is coming to Steam offering both casual and hardcore gamers a charming fantasy experience based on a classic gameplay. Get ready for the old school addiction! 

Fontix PC brings more game levels, tougher monsters than the previous versions, and it also provides an epic boss-fight against archenemy Xitrof. Online leaderboard brings a little competition in the game, while the PC-only achievement system enables you to go for a dozen extreme goals. 

If you have played it once, you have not played it for real yet! Experience casual fun as well as hardcore planning and maneuvering on the playfield! Fortix is coming to your favorite digital distribution channel Steam on the 18th of March!

 
formats

Social engineering: Deceiving people, not machines

The weakest part of any business computer system is almost always the human being using it — something cyber criminals know only too well.

Melbourne, 12 March 2010 – Social engineering is extremely pervasive and frequently effective…

  • Security experts easily convinced workers to reveal their passwords in exchange for a free pen.
  • Over half the computer users questioned in a recent AVG survey had received phishing emails.

Cyber criminals are often portrayed as technical geniuses plying their trade through the use of deviously complex computer code. While there is some truth to this, gaining access to a computer can be as simple as fooling someone into a revealing a password. This tactic of exploiting the “human aspect” of computer use is known as “social engineering” and is widely recognised as one of the most effective techniques used by cyber criminals.

“Human beings are often the weakest link in the security chain,” warns the US government advice site Stay Safe Online. “Criminals and con artists know this and exploit it. Learn how to spot the tricks they use.”

 

It’s Easy to be Fooled

 

Things to look out for include such simple tactics as phoning a random extension and tricking whoever answers into revealing their network password by asking seemingly-innocuous questions. “If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organisation and rely on the information from the first source to add to his or her credibility,” warns US government security agency US-CERT.

A fraudster used this technique to make calls to the Barclays Bank in the UK, eventually convincing a call centre worker to issue a credit card in the chairman’s name. Armed with the credit card and personal details about the chairman, the conman then went to a Barclays branch and withdrew £10,000 of the banking executive’s money. Ouch!
An example of how easily people can be tricked by social engineering was revealed by the organisers of the InfoSecurity Europe conference. Experts convinced 90 percent of workers stopped at Waterloo Station in London to reveal their passwords in exchange for a free pen. Some more suspicious workers refused at first, but eventually revealed enough information for the experts to accurately guess their password.

Kevin Mitnick, one of the most notorious hackers of all time, has admitted that social engineering was a fundamental part of his approach. “When the average person conjures up the picture of a computer hacker, what usually comes to mind is the uncomplimentary image of a lonely, introverted nerd whose best friend is his computer and who has difficulty carrying on a conversation, except by instant messaging,” Mitnick explains in his book The Art of Deception. “The social engineer, who often has hacker skills, also has people skills at the opposite end of the spectrum — well-developed abilities to use and manipulate people that allow him to talk his way into getting information in ways you would never have believed possible.”

Beware the Phishers

But social engineering doesn’t have to be done in person or over the phone. One of the most popular social engineering techniques is phishing, which is when cyber criminals bombard computer users with emails purporting to be from banks or other trusted entities where valuable information is protected by passwords.

Recipients are encouraged to respond to the mail by clicking a seemingly-legitimate link and entering their login credentials. “An attacker may send email that appears to come from a reputable credit card company or financial institution and that requests account information, often suggesting that there is a problem,” explains advice on the US-CERT web site. “When users respond with the requested information, attackers can use it to gain access to the accounts.”

Recent research conducted by AVG revealed that around 55 percent of the 250 users surveyed had received phishing emails. The survey particularly looked at how increased use of social networking sites such as Facebook, Twitter and MySpace were contributing to the growth of phishing and other security threats.

 

Other interesting results included:

  • 21% accept contact from members they don’t recognise
  • 52% let friends access social networks on their machine
  • 64% click on links offered by community members
  • 26% share files within social networks
  • 20% have experienced identity theft
  • 47% have been victims of malware infections

 

The emergence of social networking sites has led to a blending of programming-type hacking techniques with social engineering, a threat acknowledged by AVG back in 2007.

“The anti-virus industry has been in a transition period for the past two to three years as malware has morphed from simple viruses to complex malicious web site hacks that combine exploits and social engineering to scam unsuspecting users of their data,” said Lloyd Borrett, Marketing Manager, AVG AU/NZ).

Education is Key

When it comes to protecting against social engineering attacks, technologies such as those provided by AVG’s Internet Security software have an important part to play, but experts agree that educating staff is fundamental.

“An educated workforce is the main line of defence against online threats in business,” is the advice from the UK government-backed Get Safe Online campaign.

US-CERT is more specific in its guidance: “Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organisation, try to verify his or her identity directly with the company.”
The best strategy for businesses is to instil in their staff the notion that handing over any information to someone whose motives are suspect or unknown is not a good idea. This “paranoid” attitude should be brought home to new hires from day one; new employees are the most susceptible to social engineering techniques, according to Kevin Mitnick. “New employees are a ripe target for attackers. They don’t know many of the people yet, they don’t know the procedures or the dos and don’ts of the company. And, in the name of making a good first impression, they’re eager to show how cooperative and quick to respond they can be,” he warns.

 

Of course, it always makes sense to back up education with protection, so businesses should also ensure they have up-to-date security software in place. AVG’s Anti-Virus and Internet Security products include AVG LinkScanner®, a technology that can quickly and accurately determine whether or not a web page is hosting a phishing attack.

Criminals will always be able to find the chinks in any company’s computer security armour but, by paying attention to the people as well as the computers, businesses can make it much harder for the cyber criminals to break through.

Online references:

Stay Safe Online – US National Cyber Security Alliance: http://www.staysafeonline.org/

US-CERT – United States Computer Emergency Readiness Team: http://www.us-cert.gov/

Barclays chairman loses £10,000 in identity scam: http://business.timesonline.co.uk/tol/business/law/article3164914.ece

Office workers give away passwords for a cheap pen: http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/

The Art of Deception by Kevin Mitnick: http://en.wikipedia.org/wiki/The_Art_of_Deception

Get Safe Online – UK: http://www.getsafeonline.org/

 
formats

AVG Research Study Reveals More Than 40 Percent of World’s Malicious Web sites are Hosted in the United States

Germany and China Round out the Top Three Countries with Web Servers serving malware 

Melbourne, 11 March 2010 – AVG (AU/NZ), the distributor for Australia, New Zealand and the South Pacific of the world’s most popular free anti-virus software, today unveiled the results of an AVG Technologies’ research study which shows that — contrary to popular opinion — most malicious web sites are hosted on US servers and not in other countries like China.

The AVG research study is based on the analysis of threats reported during the last 6 months from AVG’s 110 million worldwide users of its AVG LinkScanner® web security product. The research indicates an increase in malware-serving web sites targeting end users, which typically focus on stealing online banking credentials, credit card information, personal identities and passwords to social sites.

The detection and analysis of exploits was based on AVG’s unique crowd-sourced methods for analysing web content for malicious or dangerous intent as reported by AVG’s vast network of LinkScanner installations worldwide. AVG’s research shows that malicious code is not just an issue with outlaw servers located in countries with weak laws and lax enforcement. Monitoring active web servers serving exploits around the world indicates that 44 percent of the corrupted servers are hosted in the United States, followed by Germany and China at just 5 percent each. Many of these malware-serving web sites are legitimate sites compromised by hackers to serve exploits on their behalf. In total, exploitive servers were found in nearly 4,600 locations throughout the USA.

It is important to note that this research makes no statement about who owns or is directing the efforts of these servers — for those criminals and/or criminal networks could be anywhere in the world — and they are.

“The results of this study shatter the myth that malicious code is primarily hosted in countries where e-crime laws are less developed,” said Karel Obluk, Chief Technology Officer, AVG Technologies. “Our research shows that malicious content is much more likely to show up on web servers in the U.S. than one in Asia or Eastern Europe. This makes perfect sense since the USA is a primary target market for the criminals and has rich and mature Internet infrastructure making the threats both highly accessible and cheap to host. What is most striking is the clear rise in the number of malicious servers in the last six months. Today’s hacking techniques are highly evasive so the average user cannot tell if a website is serving malware or not. A web security product is needed.”

Obluk continued, “Even more important to note is that, on average during this six month period, about 50 percent of the domains hosted on these servers were online and hosting threats only one day or less. This transient nature makes them very hard to find and add to traditional reputation-based protection systems in time to be helpful to users.”

“As a preventative measure, users should look for web security protection when going online,” said Lloyd Borrett, Marketing Manager, AVG (AU/NZ). “Today’s bad guys are smarter and create threats that are more sophisticated, hiding in legitimate web sites that are sometimes poisoned for less than a day. This makes a real-time solution like AVG LinkScanner absolutely critical to protect against web based threats.”

AVG LinkScanner is free and is included as a part of all AVG Anti-Virus and Internet Security products. AVG LinkScanner can be used also as a free stand-alone product delivering extra protection alongside other brands of antivirus and Internet security software. AVG LinkScanner, or AVG’s other free security products, can be downloaded at: www.avgfree.com.au

About AVG Technologies                                                                            

www.avg.com

AVG is a global security software maker protecting more than 110 million consumers and small businesses in 167 countries from the ever-growing incidence of web threats, viruses, spam, cyber-scams and hackers on the Internet. AVG has nearly two decades of experience in combating cyber crime and one of the most advanced laboratories for detecting, pre-empting and combating Web-borne threats from around the world. Its free, downloadable software allows novice users to have basic anti-virus protection and then easily upgrade to greater levels of safety and defense when they are ready. AVG has nearly 6,000 resellers, partners and distributors globally including Amazon.com, CNET, Cisco, Ingram Micro, Play.com, Wal-Mart, and Yahoo!

About AVG (AU/NZ) Pty Ltd — www.avg.com.au

Based in Melbourne, AVG (AU/NZ) Pty Ltd distributes the AVG range of Anti-Virus and Internet Security products in Australia, New Zealand and the South Pacific. AVG software solutions provide complete real-time protection against the malware, viruses, spam, spyware, adware, worms, Trojans, phishing and exploits used by cyber-criminals, hackers, scammers and identity thieves. AVG protects everything important and personal inside computers — documents, account details and passwords, music, photos and more — all while allowing users to work, bank, shop and play games online in safety. AVG provides outstanding technical solutions and exceptional value for consumers, small to medium business and enterprise clients. AVG delivers always-on, always up-to-date protection across desktop, and notebook PCs, plus file and e-mail servers in the home and at work in SMBs, corporations, government agencies and educational institutions.

AVG products actively protect over 110 million users worldwide, including more than 4.6 million users in Australia and New Zealand.

 
formats

BRINK CINEMATIC TRAILER