Showing posts with label malware. Show all posts
Showing posts with label malware. Show all posts

Tuesday, January 8, 2008

Ways To Protect Your Computer From Spyware and Adware

If you have got any cognition whatsoever about the Internet, then you are probably more than than aware of the many unsafe spyware and adware programmes that are lurking in the shadows waiting to infest your computing machine system. You are probably also aware of the many reputable programmes that are available to assist antagonize them, the bulk of which are legitimate. Unfortunately, there are a few of them that claim to protect you when in actuality they too are out to infest your system with some kind of malware. You could easily compound an already existing job by using one of the illicit programs. The good news is that there are ways to protect your system from spyware and adware as well as ways to find if an anti-spyware programme is legitimate.

You first line of defence against knave anti-spyware programmes is research. Before you take any program, make some research on what consumers have got reported about it. You can acquire a really good thought of how good a programme is just by seeing how effectual it have been for others. People are eager to supply feedback on a merchandise that have not met their expectations, especially when if it makes more than of a job for them. There are respective websites that give fairly accurate reports, both good and bad, on these programs.

Also, never trust an anti-spyware Oregon adware programme that is offered through a pop-up window, especially one that claims your system is currently infected. The fact that it is offered through a pop-up window to get with should raise a reddish flag immediately. Pop-ups are sneaky, underhanded ways for advertizers to acquire the information they desire from you without your permission. In some cases, just clicking the stopping point button inside of a pop-up window will put in unwanted spyware or adware on your computer. With that beingness said, protect yourself even additional by installing a reputable pop-up blocker to forestall dangerous, unsought pop-up advertisements.

Besides keeping an up-to-date anti-spyware programme and a pop-up blocker installed on your computer, there are other things that you yourself can make to assist protect your system:

- Never download any programme or unfastened any electronic mail that you are uncertain of. If you are not 100% positive that it is something you want, make not download or unfastened it.

- Brand certain you update your operating system data files on a regular basis, especially if you utilize Windows. Many security loopholes are fixed with during these updates so they are important.

- If you utilize Internet Explorer, set your browser security scenes to at least medium.

- A good firewall travels a long manner towards detecting possible system intrusions.

Each and every twenty-four hours there are new spyware and adware programmes hitting the Internet. Your best defence against them is to do certain you are ready for them. While you may not be able to guard them all off, taking the stairway above volition supply you with the best protection possible.

Thursday, November 29, 2007

Network Security: Gullible Users Are the Weakest Link

Despite improvements in system and web security, crafty cybercriminals stay a important threat, adjusting their methods to take advantage of unwary Internet users, the SANS Institute states in its study on the top 20 Internet security hazards of 2007, released Tuesday.

Hackers and cyberspies have got shifted their focusing and moved away from the widespread malware onslaughts that exploited software-based exposures in favour of more than targeted assaults that trust upon unsuspicious users' credulousness and custom-built applications, the study states.

"For most big and sensitive organizations, the newest hazards are the 1s causing the most trouble," said Alan Paller, manager of research at SANS. "The new hazards are much harder to defend; they take a degree of committedness to uninterrupted monitoring and inflexible attachment to policy with existent punishments that lone the biggest Banks and most sensitive military organisations have got so far been willing to implement."

Spyware infections, including keystroke loggers, are among the most commonly used word forms of malware establish on compromised systems. Since January, there have been a 183 percentage addition in Web land sites "harboring spyware," said Gerhard Eschelbeck, main engineering military officer of Webroot, a spyware sensing firm.

Software Security


Vigilance and regular updates from operating system shapers have got led to more than unafraid systems and decreased cyber criminals' ability to establish monolithic Internet worms that were frequently seen between 2002 and 2005, such as as Melissa, Zotob and Blaster. As a consequence of the renewed accent on security from (Nasdaq: MSFT) , for instance, there have not been a new large-scale worm onslaught targeting Windows systems since 2005, according to SANS.

However, even as operating systems have got got got go increasingly secure, other types of software system have been responsible for an addition in the figure of "client-side vulnerabilities." Vulnerabilities in antivirus, backup and other applications have been hit by worms. Most notable, SANS research workers said, was the worm that exploited a buffer flood in (Nasdaq: SYMC) antivirus software system last year.

Browsers, business office software, mass media participants and other desktop applications business relationship for a important growing in exposures on the client side. Although Microsoft's Windows operating systems are less vulnerable to attack, Qualys, a security house that scans billions of systems for vulnerabilities, said it have seen a nearly 300 percentage growing in exposures in Microsoft Office products.

The primary perpetrator is the up-to-the-minute version of Excel, which can easily be exploited "by getting unsuspicious users to open up Excel data files sent via e-mail and instantaneous messages," said Amol Sawarte, director of exposure laboratories at Qualys.

"Microsoft have their macro instruction linguistic communication built into Microsoft Office, and sometimes it's hard to actually observe [problems]. Second, with everyone worried about Windows and keeping that up to date, people don't always worry about keeping Office up to date," said Henry Martin Robert Ayoub, an analyst at .

More than any other type of software, Web application insecurity the most "troublesome because so many developers are writing and deploying Web applications without ever demonstrating that they can compose unafraid applications," SANS' Paller said. SANS ranked critical exposures in Web applications No. One on its top 20 list.

"Most of their Web applications supply entree to back-end databases that clasp sensitive information," he continued.

However, "until colleges larn computer computer programmers and companies that use programmers guarantee that developers learn unafraid coding, and until those employers guarantee that they work in an effectual unafraid development life cycle, we will go on to see major exposures in nearly half of all Web applications," Paller noted. Security Solutions


To protect themselves from critical exposures in Web applications, consumers and endeavors can deploy a Web application firewall and security scanner.

In addition, concerns should have got got got application beginning codification testing tools, application incursion testing services and a formal policy that all of import Web applications will be developed using a valid unafraid development life rhythm and only by developers who have proven -- through testing -- that they have the accomplishments and cognition to compose unafraid applications, SANS advised.

Combating people's inclination to swear instruction manual and golf course included in e-mails -- whether because they are too busy or too distracted to be disbelieving -- necessitates a twofold approach, Ayoub told TechNewsWorld.

Ayoub holds with the SANS recommendation that concerns behavior security consciousness preparation as well as its warning not to give users inordinate rights and let unauthorised devices.

"There are definitely users that are going to chink on e-mails they're not supposed to. And inordinate user rights is one country where a batch of endeavors are not doing 100 percent. A batch of organisations really haven't gotten this portion under control and aren't enforcing their internal policies and aren't doing the smack on the carpus to maintain people from participating in activities that aren't safe," he explained.

"As an industry, we cannot remainder on our laurels. There have to be continued education. There have to be continued improvements and updates," Ayoub continued.

However, instruction can only make so much, said Greg Young, a (NYSE: IT) analyst. "It's less about instruction and more than about taking action. There have been a batch of talking and not much action in organizations. Organizations just necessitate to support thyself.

"End users will always [open e-mails from aliens and chink on golf course sent to them]. That's human nature, and that is why instruction have limited value. You have got to take action to protect against the things we cognize can and will happen," he continued. "Humans are the weak link. And there are some pretty basic stairway we can take to protect ourselves against ourselves and the bad guys."

Enterprises too often have got got webs that make not have adequate depth of defense, he asserted. The critical assets of too many webs are distribute out or are openly accessible to all internal users, he pointed out.

"These are not merchandise vulnerabilities, it is a misconfiguration," Young told TechNewsWorld. "You have got to do certain you are protected. There is an surplus of things you can purchase and install. The security marketplace is flush. You have got to take action yourself. This have to be a management-down goaded [solution]. It is not an IT job anymore; it is a concern problem."

Tuesday, November 27, 2007

Search Google, Click to Massive Malware Attacks?

Tuesday, November 27, 2007 1:00 Prime Minister PST

Recommend this story?


Please Wait...

A large-scale, coordinated political campaign to maneuver users toward malware-spewing Web land land sites from hunt consequences is under way, security research workers said Tuesday.

Users searching Google with any of 100s of legitimate phrases -- from the technical "how to lake herring router vpn dial in" to the heart-tugging "how to learn a domestic dog to play fetch" -- will see golf course near the top of the consequences lists that Pb directly to malicious sites hosting a mountain of malware. "This is huge," said , 's CEO. "So far we've establish 27 different domains, each with up to 1,499 [malicious] pages. That's 40,000 possible pages."

Those pages have got had their Google ranking boosted by crooked tactics that include "comment spam" and "blog spam," where bots inundate the remark countries of land sites with golf course or mass big Numbers of them as fake blog posts. Attackers may be using bots to stop up golf course into any Web word form that petitions a URL, added Sunbelt malware research worker .

There's no grounds that the felons bought Google hunt keywords, however, nor that they've compromised legitimate sites. Instead, they've gamed Google's commanding system and registered their ain sites.

"They acquire themselves on to Google, then redirect people to their malware pages," said Eckelberry. Most users wouldn't surmise anything's awry with the knave results, although the ultra-wary might be leery because many of the malicious URLs are just a clutter of characters, with 's .cn top-level domain at their ends.

Once shunted to a malware-hosting site, the user might confront a sham codec installing dialog. If the user doesn't bite, the page's IFRAME will acquire him, said Thomas. "This is what's doing the most damage," he said. "It's loaded with every piece of malware you can believe of, including bogus toolbars, knave software system and scareware."

One land site that Seth Thomas encountered tried to put in more than than 25 separate pieces of malware, including numerous Dardan horses, a Spam bot, a full-blown rootkit, and a brace of watchword stealers. All the malicious codification pitched at users is well-known to security vendors, and can only work PCs that aren't up-to-date on their patches.

"I ran into one, and it hosed my VM [virtual machine]," said Eckelberry. "Completely hosed it."

While Eckelberry called the cozenage "impressive" in scope, Seth Thomas echoed his foreman in describing the attack's magnitude. "It's wish they've colored any possible hunt term you can believe of," said Thomas. "There are 10s of one thousands of [malicious] pages out there."

Sunbelt's company blog athletics silver screen shots of respective Google hunt consequences lists, with malware-infecting land sites identified, as well as mental images of the fake codec installing dialogues and the codification of one of the malicious IFRAMEs.

Monday, May 21, 2007

Antivirus - What is a Computer Virus?

Before understanding what a computer virus is, it is necessary to understand what a virus in when it occurs in a living form (such as a human body, an animal, or a plant).

A virus is a small organism that is only able to reproduce itself within another living cell or body. It is typically harmful to the cell or body in which it lives, and is the cause of many illnesses and diseases. The word virus comes from Latin and literally it means "poison." So basically it is a "poison," able to reproduce itself within another cell or body. An example of an illness caused by a virus is the flu.

How does this relate to computers? Well basically, a computer virus is a harmful computer program which will damage files or your computer, and which is able to duplicate and spread itself within a computer or computer network. Usually the computer virus is hidden within a program, file or document.

Criminals, or somewhat talented idiots with nothing better to do with their time, create computer viruses and spread them to other people's computers. The sole purpose of this activity is to create trouble and damage.

Similar to a common virus like the flu (which spreads from person to person), the computer virus has the ability to spread and "infect" other computers, files or documents. A computer virus can spread itself through files and documents; such as word-processing documents, spreadsheets, emails, computer programs etc. It can spread itself through the Internet and through local computer networks, as well as through removable storage devices such as memory sticks and floppy disks. Because it is hidden, it is hard to detect. It can be spread to other computers, unknowingly, by the computer user.

What exactly does a computer virus do? Well, it works similarly to viruses (like the flu) that make a person sick. A computer virus will make your computer "sick". What a virus will do to your computer depends on what it is programmed to do. Some can be very harmful, while others are made to simply annoy.

A wide variety of names have been made up, in order to describe different types of computer viruses. Some examples are as follows (you may click on these terms for a more detailed description of what they are):

Macro Viruses

Email Viruses

Trojan Horses

Understanding the basics of what viruses are is the first step to learning what to do about them, and how to be completely in control of your computer's security. I hope this information has been of use to you.