Tag Archive: virus

globe2The increasing number online users have triggered interests of cyber hackers and online criminals. This prompted for a stronger security measures. Among the top advices from experts to stay safe online includes enabling multi-factor authentication on all online accounts – every single one of it. It is also advised to use strong passwords and keeping them safe all the time.

Experts discourage the use of illegal software and download, as illegal sites are packed with malware and viruses. Speaking of virus, it is very important to keep your device firewalled and keep your antivirus updated. Lastly, perform regular backups for future data recovery.

Source: IT Pro Portal

Hyderabad – No matter how hard internet security experts try to battle cybercrimes, hackers always seem to find their way to get into a company’s database or an individual’s personal information. Internet security experts encourage the public to take pre-emptive security measures to protect themselves from any form of attack or viruses. According to Govind Rammurthy, Managing Director and Chief Executive Officer of eScan, Indian infrastructures haven’t been affected by any attacks.

However, he indicated that Linux and Mac based operating systems is vulnerable to the Bash Shellshock. Symantec encourages the public to practice sandboxing and access control protocols to help protect themselves from virus attacks. For more information on this post, go to the source.

Source: The Hindu Business Line

Screen-exclamationWhen it comes to how phishing and spy frauds work their way in getting access to your personal information, most of it would simply rely on exploiting ones trust. Most of the time hackers or cybercriminals seem to make a malicious message to appear as if it was from a legitimate source. When that happens, most users on the internet find it easier to work their way into your personal information as well as your bank account. More often than not, a malware would simply get into your system, accessing your personal information and contacts. This allows hackers to send out fraudulent emails on your behalf. The same techniques apply with social networks, instant messaging and SMS text messaging. For more information regarding this post, go to the source.

Source: PCWorld

Screen-exclamationAre you eager to know the latest and most up-to-date tool that you can use to battle keyloggers as well as Trojans to protect your PC from constant threats? Just recently, Kaspersky has released the 2014 version of their internet security software. According to them, this new tool can help protect your PC from cybercrimes or hackers aiming to steal your personal information to wreak havoc onto your computer.  According to its developers, their latest version of the anti-virus suite, Internet Security 2014 would provide users an added functionality and boosted protection for various attacks on the internet. For more on this news, go to the source.

Source: Toms’ Guide

Phishing JUST got better.

This is not a TV commercial, but fraud sent as  offer, propaganda or scare/threat into your inbox, compelling and offering you wealth, fast cash, car or even a home or sometimes  scaring you to act fast, all targeting your credit, bank and personal information and stealing confidential details, if you would follow.

Maybe there were times you got an email from a Prince, a King or a Queen, perhaps, telling you he/she would leave fortune into your bank.

(Too good to be true—an offer coated in shining, shimmering gold)

Sometimes, phishing emails disguise as A BANK, targeting your bank details. They may even POSE A WARNING, alerting that your secured info was compromised, your account would be closed or other threats JUST TO MIND CONDITION YOU.

Following suit, people sometimes follow, being afraid their bank accounts were breached, compromised or hacked, especially among online banking subscribers.

Let me explain.

Spam, a term coined by Monty Python, means repetitive and unwanted emails, as simple as that.

Phishing, on the other hand, contains unscrupulous and malicious threats, viruses and malware, among others, all geared toward hacking and stealing your personal and financial info.

WARNING

Phishing emails appear secured, pretending as trusted sources, but they are not.

Beware by clicking only emails from trusted sources. Remember that banking and reputable companies NEVER OBTAIN INFO USING EMAILS.

You calling and answering important info is an SOP among companies—they do not ask security information through emails. Remember they do not provide external links for clicking as well.

Tips To Avoid Spam and Phishing

  • Email address. Look for fine toothcomb such as a misspelled company name. If found, delete the email right away.
  • Subject Line. Do not click on any emails with attention-grabbing subject lines that threat you, usually using subjects related to bank information.
  • Spelling, grammar and punctuation. Beware of broken English, with erroneous company and people names.
  • Personalization. Spam emails may contain only one long sentence with a link in the end and without any personalization.

(READ THE COMPLETE GUIDE TO DETECTING PHISHING EMAILS HERE.)

Conclusion

It’s always best to practice extreme caution when opening and reading emails, even if they were from people you know. Delete any emails asking for money and without personalization.

For optimal online security from phishing and spam, install total solution against malware, virus and other online threats, BitDefender.

It is a known fact that a lot of malware and malicious hackers are roaming around the World Wide Web today. With lots of tactics they have been working for years, antimalware researchers come across some techniques that will surely stretch the boundaries of malicious hacking.

These tactics include fake wireless access points, cookie theft, file name tricks, relative versus absolute trick on file locations, host file redirect, waterhole attacks, bait and switch, and total loss of control. These techniques bypass malicious innovators and rip off the savviest users in the virtual world.

Source: CSO Online

 

According to Symantec’s Annual Internet Security Threat Report out last week, it had blocked a total of 5.5 billion web attacks last year.

Where did those attacks come from? According to the report, one is more likely to be infected by malware placed on a legitimate web site than one created by a hacker.

Religious or ideological sites were found to have tripled the average number of threats for infected sites than for pornographic sites.

Symantec explains, “We hypothesize that this is because pornographic website owners already make money from internet, and, as a result, have a vested interest in keeping their sites malware-free – it’s not good for repeat business”.

It might also be because religious sites often don’t have strong defenses against malware, making them an easy target for malwares, and in turn, infect visitors. Well, most porn wanderers would feel relieved for sure.

 According to Symantec’s Annual Report, there are also several types of malwares out there. Symantec reports more than 403 million varieties.

Increasingly, nasty malwares are moving to mobiles. Mobile phone OS vulnerabilities have almost doubled, with 315 discovered in 2011. The Symantec Internet Security Threat Report indicates that these mobile attacks happened in Android devices because unlike IOS, the Android is an open source.

 The Symantec report was unable to come up with a definite figure regarding how much the hackers were making, but estimated that the Flashback trojan, which is infecting hundreds of thousands of Mac computers, could be generating as much as $10,000 per day.

Also known as Flashfake, the Flashback trojan disguises itself as an install Java applet on hijacked sites. When the user approves it, the trojan runs a piece of code that exploits a flaw in Java to remove OS X’s anti-malware abilities. It then has the ability to steal clicks from ads on Google’s search engine next to regular search results.

 Flashback installs alternative control programs, which turns Macs into bots. Meanwhile, the cyber criminals reap the benefits from the ghost clicks, meaning ad clicks that are not performed by a human, but by a bot instead.

So you take the independent good development with the bad. Remember, these numbers come from Symantec, a company that sells software to protect users from malware attacks.


Source:  Symantec
More Security Software

Two of the biggest social media sites, MySpace and Facebook, have recently faced a worm which has offered people a video but underhandedly inserts a Trojan into their vulnerable systems.

This social media phenomenon has been bound to catch the attention of vicious hackers and criminals. Especially because many younger users are may not be as cautious in clicking on flashing links or pop-ups. This has contributed to the most recent malware problem circulating the internet.

Read More »