Search This Blog

Thursday, October 22, 2009

INTERNET SECURITY: VIRUSES & Malware

INTERNET SECURITY: VIRUSES & Malware

Know Thy Enemy
In very short space of time computer technology has ever changed the way we work and play. From word processing to email to surfing the World Wide Web, the brief history of personal computers abounds in advances in processing power, productivity, and entertainment which have radically affected our everyday lives.
Whilst we are struggling to keep up, others are taking advantage and working on ways to capitalise on our vulnerability and separate us from our money.
PandaLabs recently conducted a research study on Identity Theft Malware.
The report contained some chilling statistics:
PandaLabs scanned 67 million devices in 2008
More than 10 million of those were infected with some form of spyware designed to steal personal information.
Only 35 % of all these devices had updated antivirus programs installed.
In the United States, personal data retrieval spyware affected more than 3 million people in 2008.
In the 2nd half of 2008, malware infections grew by a frightening 800%, compared to the 1st half.
PandaLabs estimates the infection rate of ID theft spyware will increase 339% per month in 2009.
Therefore if you are a regular Internet user, you need to protect yourself from potential threats (or Malware) to your Internet security.
The first step is to know your enemy.
One of these enemies is Spyware...

SPYWARE
What is Spyware?
Spyware is a software program that you unwittingly downloaded into your computer and sends information back to the people who developed it.
Who Develops Spyware?
Spyware developers are people like marketing companies who are interested in your system details, your Internet surfing habits and your contacts list. Others are even more dangerous as they are looking to find out your passwords and login information when you are shopping online or doing your banking.
One tell tale sign that you have spyware on your computer is pop-up ads randomly appearing on your screen.
How did it Happen?
Spyware developers capitalise on your fear, need for protection and wanting your computer to operate at its optimum level. Therefore it's easy to accidentally install spyware as it comes along with a free software download often disguised as a game, an animation (like an emoticon), an antivirus program or a registry cleanup booster.
Once you have downloaded the program into your computer they may even ask you for money, and oftentimes even though you pay, the program will never work. This means that they have now not only installed spyware on your computer, they have your credit card details as well.
The newly installed spyware operates in your registry in the background where you can't see it, and constantly gathers information sending it back for nefarious use.

Is It Legal?
Spyware is against the law ... sort of
There are laws against installing software on a computer without the user's consent but...
The problem is that you can inadvertently consent to spyware being included when you download and install free utilities or games. For instance when you click on the Next button to install software, stating you have read and understand the end user license agreement, you're allowing spyware to go to work on your computer.
These software developers are very clever cookies. They can legally cover themselves by often describing the purpose of their software in the end user license agreement (EULA) which you agreed to during the installation process. It will be in technical language that you can barely understand and when you click the I agree radio button, they can prove that you knew about the program’s purpose when you installed it. As a result there are software applications available that will read the license agreements for you and warn you through keywords and key phrases if there is a spyware risk.

Other Types of Malware
There are many other kinds of invasive programs that can damage your computer and are designed to make your life miserable.
In its most harmless form, malware can collect data on your Web surfing activities and deliver ads for specific products or services that you commonly search for. In its most destructive form malware can also turn your computer into a zombie, sending spam e-mail to all your contacts and beyond. Nowhere in can also take over your system and use it to store its own data such is illegal images.
Some malware programs will capture every keystroke and mouse click you perform and will follow you as you log into your bank account and other important sites.
Here are some definitions of Internet security terms to help you understand the threat:

Malware: (malicious software) A generic term used to define any software that secretly runs on a computer without your knowledge that causes harm. Therefore spyware can also be malware.
Adware: Lives on your computer without your knowledge. Evidence that adware is present on your computer is when a program you are running constantly produces pop-up ads. These ads will be tied to a specific advertiser and the aim is to discover your surfing habits and send you ads that you may be interested in clicking on. Filling out Customer surveys are one of the most common forms of adware.

Virus: viruses are designed by people known as computer hackers. Hackers are computer programmers who write a malicious code that once installed through opening an infected e-mail, internet program download, CD, floppy disk or external memory drive can do such things as change your desktop settings, reassign file extensions or even destroy your entire hard drive. Viruses are often cleverly disguised as the aim is to spread the virus through taking advantage of the average computer user’s ignorance of how they work and what to recognise.
Viruses will be hidden in documents and designed to spread throughout files contained on a single computer and computers on a network, bearing in mind the largest network of computers in the world is the Internet. A Hacker’s motivation is often just to see how far they can spread a virus and how much damage they can cause, often being just teenagers.

Worm: A worm is a self reproducing program and is very similar to a virus as it spreads itself around a computer network duplicating itself as it spreads. While it does not infect other programs it can create multiple copies of itself who then create more copies of themselves. A worm also sometimes has the ability to avoid detection through changing its own profile information.
Worms are usually found on business networks and larger operating systems. As the infection multiplies throughout the network systems will become overloaded and then finally simply shut down.

Trojan: So named as this infection acts similarly to the Trojan horse of Greek mythology. A Trojan can looked like something quite innocent, for example an update or program add-on. Trojan's can gather information and send it back to the developer or it can perform malicious functions such as deleting files or racing your hard disk.

Cookie: Cookies aren't considered to be malware, but they can be utilised by the unscrupulous to be used in a similar way. Everytime you click on the internet (especially on a shopping site), a cookie is created storing the data on your computer. When you start to fill out a form for instance and your name automatically appears in the ‘name field’ then this is a cookie that has been created previously. This is very convenient for you. Some websites will create cookies on your computer, stored in your cookies file, which allows them access to find out what you bought, how you paid for it, your personal information, and even the things you just looked at and didn't buy.

Defend Yourself
No matter whether you are a home computer user or a business you need to protect your computer assets and personal information.
New Computer viruses, worms, and Trojan horses are reported everyday, so it is imperative to know the best ways to protect yourself.
The best defence is offense when it comes to malware.
Taking action to avoid getting viruses and the like on your computer will help protect you from becoming a victim. This can be easier said than done and know that no matter you do, it is nearly impossible to avoid an infection at one time or other. This being said, there are a number of positive actions you can take to guard against the threat:

1. Set up automatic updates for Windows in your control panel. Critical updates designed to eliminate or avoid specific current malware threats are issued monthly by Microsoft. These will be automatically installed on to your computer for you.

2. Install an Anti-Virus Software Package and keep it updated at all times. Anti-virus software is a program that searches your computer's hard drive, external drives such as CDs, floppy disks, and memory sticks as well as your email attachments for any known or potential viruses. It will not only identify them, and in the best products, remove them for you.
There are many of these available, the best of which are free.
Try
www.freegrisoft.com for AVG or www.avast.com
Surprisingly it is recommended that the home user avoids those who charge money such as the most popular brands including Norton, Microsoft Defender, McAfee, Spybot Search & Destroy, and Trend Micro as they are not as efficient and are often the cause of computers malfunctioning or operating at an extraordinarily slower speed. Your Internet service provider may have their own or maybe able to recommended a solution as well
In order to stay protected, update your antivirus software by setting a regular schedule in the program itself (once or twice a week).
NB: There is a difference between updating and upgrading your software. Upgrading is usually where they want you to pay for a version that you are using for free. You NEVER have to Upgrade, but you MUST ALWAYS UPDATE.

3. Don't download shareware (or anything else for that matter) from unknown sources. Look for providers of free utilities, such as
www.download.com

4. Read the end user license agreement before committing to the installation of software you are installing off the internet. If you have any doubts then do not install the software

5. Don't click on any pop-up or advertisement for free anti-spyware software upgrades. These are almost always fake, even if they have the logo of a well-known program. This is a very popular method used to distribute spyware and other malware. Instead go directly to the antivirus software company's Web site and make sure it exists.

6. You can set your browser and operating system to a higher security level. You should have these levels set to at least the medium setting or higher. More warning messages are a small price to pay for security.

7. Install a firewall and make sure it is turned on

8. If you have a home network use a separate modem or router rather than sharing an Internet connection through just one in your computers

9. Avoid strange looking websites. If they look questionable then don't stick around. Be cautious when downloading files from the Internet. This means don’t download files sent to you by strangers and make sure that the source of the file or program is legitimate . If in doubt, don't download it at all or download the file to an external drive and scan it with your anti-virus software

10. Don't click on virus alerts that pop-up on your screen unexpectedly. Don't even try to close it by clicking on the X. close it down by holding down the Ctrl+Alt+Delete keys to launch your task manager. From the task manager dialog box, look down and click on the End Task button to close the window, instead. Then run a complete scan of your system using your antivirus software

11. Never open an e-mail attachment if you're uncertain of who sent it

12. Don't open email attachments if the subject lines seems strange or is unexpected

13. Don’t have a reading pane open when you check your Junk Mail.

Regular Check Ups by Experts
As with any mechanical device or even the human body, your computer needs regular checks and servicing. If you haven’t had your computer checked for viruses in the last 12months, then it is highly recommended that you bring it in for a physical, especially if it seems to be running slower than usual, or things don’t seem quite right.
It is important to know that removing a Virus, Trojan or Worm can be a very involved process taking days of scanning and recovering of files
I don’t mean to scare you into this, but viruses are now an unfortunate fact of life and I am committed to keeping you safe and secure.
It is better to be safe than sorry

Looking forward to hearing from you,
Kim-Denyse
mycomptutor@gmail.com
www.mycomputertutor.net.au

No comments:

Post a Comment