Posts Tagged 'malware'

Security For Windows 10 – FreeFile Review

win10-sec

This review addresses how an average user of Windows 10 can easily and effectively maintain security. These are my experiences and observations after more than a year using Windows 10, your mileage may vary.

Antivirus Protection – Many security pros feel that zero-day threats greatly reduce the effectiveness of antivirus programs. Overall, I find Windows 10 to be reasonably secure, and today, most security threats focus on internet browsers. Windows Defender is a lightweight, efficient program, pre-installed with Windows, that operates unobtrusively and effectively. It runs in the background with no user input needed and it receives frequent updates. Use Windows Defender – no additional antivirus is needed.

Browsers – Both Firefox and Chrome are good choices. The best malware blocker add-on is uBlock Origin (available for Firefox and Chrome). Keep your browser up to date and install uBlock origin and you’re good to go. Bear in mind that smart surfing is still the most important thing you can do – no app can help with that.

Malware Scanner – The free version of Malwarebytes does not provide realtime protection, but it is effective when run every week or two, or when a problem is suspected.

Disk Imaging – This is the most important piece to achieve real security. All of the previously mentioned steps can fail, so the ability to quickly recover is key. Imaging software makes an exact copy of the entire C drive, so that the entire PC can be quickly restored after disaster strikes. This will protect you from not just virus and malware attacks, but also from hardware failures and Windows issues. Ideally, the image should be stored on an external drive, so it may require spending about $50. The best free imaging software is Macrium Reflect. It is very fast and reliable.

— — — — The Bottom Line — — — —

1.Use Windows Defender (no additional antivirus programs are needed) 2.Use Firefox or Chrome browsers, with uBlock Origin add-on 3.Get Malwarebytes 4.Consider disk imaging.

Read more FreeFile Reviews on DanKostecki.com

The Malware Museum

malwareMuseum

The Malware Museum contains representations of what viruses and assorted malware infestations would have looked like in the 1980s and 90s. There are currently 78 examples in the collection. They all run harmlessly in your browser.

Enjoy the good old days HERE.

 

Macs Are Special – So Are Their Security Procedures

glitter-npolish

ZD Net reported on a new bit of malware aimed at Macs-

A security researcher has discovered a way to infect Macs with malware virtually undetectable and that ‘can’t be removed.’

At the end of the article, very special advice is given –

One defense against this would be to paint over the case screws with glitter nail polish and take close-up photos of the seal you created. The glitter in the nail polish sets into a random pattern that would be impossible to replicate, and as long as you keep the photos safe, you can make sure they screws haven’t been messed with.

I just don’t know.

21st. Century Customer Feedback [comic]

original source

co140915

Hackers Gain Access Through Chinese Take-Out Menu

chinese-takeout-boxGizmodo reports –

With big companies taking every precaution against malware they can possibly think of, it’s getting increasingly difficult for hackers to wedge their way in. So instead of going after the highly secure company employee accounts themselves, hackers are going after what those employees hold most dear—Chinese takeout.

Continue reading HERE.

 

Geekiest YouTube Channel – Classic Computer Viruses

Danooct1 may post the geekiest videos on all of YouTube. He infests vintage computers with old time viruses and records the ensuing mayhem. There are not just a few videos; there are literally, dozens and dozens of them. One word of warning –  you must be a real computer nerd to enjoy this stuff.

Danooct1’s YouTube channel

Does Avast Antivirus Have Security Issues?

avast-wpFirst, let me say that I have been using Avast as my antivirus for the past few months and have had no problems with it. However, yesterday, the program invited me to view my monthly security report. The link took me to a web page that I could not view without enabling JavaScript in Firefox. I am no security expert, but disabling JavaScript is generally considered to be one of the best ways to block malware on the web. I visited Avast’s home page and main download page, and received the same message. Why does a security company require an insecure JavaScript-enabled browser to use their site? My guess is just poor site design – nothing sinister. However, when their entire web site encourages dangerous activity, I have to question how solid is their antivirus product. Out of curiosity, I visited the sites of two of the other big free antivirus programs, AVG and Avira, and found that JavaScript was not required on those sites.

While this information causes concern, I plan to continue using Avast and blocking JavaScript with NoScript on Firefox. Hopefully, the antivirus will continue to perform well and they will improve their site.

 

Another Patch From Apple [comic]

original source

 

Flashback Trojan Hits 550,000 Macs

PCmag reports –

Analysis of a recent Java flaw exploited by the Flashback Trojan reveals that more than 550,000 Macs were affected in the U.S. and abroad, according to anti-virus vendor Doctor Web. “This once again refutes claims by some experts that there are no cyber-threats to Mac OS X,” Doctor Web said in a Tuesday blog post. About 56.6 percent of the infected computers, or 303,449, are located in the U.S., while 19.8 percent are in Canada, 12.8 percent are in the U.K., and 6.1 percent are in Australia, Doctor Web said.

Continue reading HERE

 

 

Mac’s Freedom From Malware May Be Over

DailyTech reported –

Security researchers at Sophos Labs have discovered a naughty new trojan that’s in the process of beta testing attack capabilities against the growing population of Mac users. The trojan exploits open back doors in OS X to gain a good deal of access to the system.  It can be transmitted through a variety of vectors, including torrent files or seemingly legitimate download programs.  It could also be, in the future, delivered via the exploitation of browser flaws to perform “drive by downloads”. Once inside, the Trojan gets down to business, allowing the attacker to have their way with their Apple victim.  The attacker can plant text files on the desktop, force URLs to open, run shell commands, and pop up fake password windows in a phishing attempt. They can also force the users machine shutdown or reboot. When a reboot is forced an amusing message pops up, informing:

I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can’t be infected, but look, you ARE Infected! I have full controll over your Computer and i can do everything I want, and you can do nothing to prevent it. So, Im a very new Virus, under Development, so there will be much more functions when im finished.

Continue reading HERE.

 

Koobface Worm Targets Macs – Much More Stylish Than Any PC Worm

Computerworld reports –

A new variant of the Koobface worm that targets Mac OS X and Linux as well as Windows is spreading through Facebook, MySpace and Twitter, security researchers warned today. Antivirus firms first reported the malware, dubbed “Boonana,” on Wednesday when Intego and SecureMac, two Mac-only security vendors, warned Mac OS X users that the worm was aimed at them. Boonana spreads via messages posted to social networking or microblogging sites. Those messages bait the trap with the subject “Is this you in the video?” and a link to a malicious site. People who bite and click the link are then prompted to run a Java applet.

Continue reading HERE.

Did Computer Virus Cause Airliner Crash?

MSNBC reported –

Authorities investigating the 2008 crash of Spanair flight 5022 have discovered a central computer system used to monitor technical problems in the aircraft was infected with malware. An internal report issued by the airline revealed the infected computer failed to detect three technical problems with the aircraft, which if detected, may have prevented the plane from taking off, according to reports in the Spanish newspaper, El Pais. Flight 5022 crashed just after takeoff from Madrid-Barajas International Airport two years ago today, killing 154 and leaving only 18 survivors. The U.S. National Transportation Safety Board reported in a preliminary investigation that the plane had taken off with its flaps and slats retracted — and that no audible alarm had been heard to warn of this because the systems delivering power to the take-off warning system failed. Two earlier events had not been reported by the automated system. The malware on the Spanair computer has been identified as a type of Trojan horse. It could have entered the airline’s system in a number of ways, according to Jamz Yaneeza, head threat researcher at Trend Micro. Some of the most likely ways are through third party devices such as USB sticks, Yaneeza said, which were responsible for the International Space Station virus infection in 2008, or through a remote VPN connection that may not have the same protection as a computer within the enterprise network. Opening just one malicious file on a single computer is all it takes to infect an entire system. “Any computer that is connected to a network is vulnerable to a malware infection,” O. Sami Saydjari, president of Cyber Defense Agency, told TechNewsDaily. “Standards have not been set to protect critical infrastructure.” An incident like this could happen again, and most likely will, according to Saydjari. A judge has ordered Spanair to provide all of the computer’s logs from the days before and after the crash.The final report from crash investigators is not due to be presented until December.

original source


Archives

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 697 other followers


%d bloggers like this: