Here at SecurityWatch, we often talk about malware that masquerades as legitimate software in order to trick users into downloading and installing rogue programs. Users need to remember two important tips in order to steer clear of these malicious applications.
Install from Authorized Sources
Cyber-criminals behind these scams rely on users downloading software from unauthorized sources to push their fake products. On Tuesday, Trend Micro researchers reported a banking Trojan that passed itself off as an installation file for Google Chrome to Brazillian and Peruvian users. Even though the fake installer had the same name as the legitimate file (ChromeSetup.exe), users should have been leery of the fact that the files appeared to be hosted on sites such as Facebook and MSN.
Many users often get hit with rogue software when they try to get pirated versions of software. This isn't a discussion on whether or not you should download pirated software, but it seems pointless to try to download free software (such as Chrome) from alternative sources.
Remember the recent furor over the Flashback Trojan that infected Macs? Flashback got its name because it pretended to be an update file for Adobe Flash. If you need Flash, take the time to go to Adobe.com and download from there directly.
"Use caution when you click links in email or on social networking websites," recommended Tim Rains, director of Trustworthy Computing at Microsoft on the Microsoft Security blog.
However, one of the links identified by Trend Micro happened to be a Google Brazil address. While Net-savvy users may be aware that large companies such as Google are unlikely to link directly to an executable file, this is very tricky. Here is where tip number two comes in. Have a firewall and security software running.
No, Really. Stick to Legit Sources
There is a lot of discussion in security circles over the value of anti-malware tools, especially since many malware writers test their code to bypass major scanners. While there are malicious software that can slip through at the beginning of an outbreak, not having security software in place is akin to leaving the door open in a house and being surprised the burglars came in. Most security software nowadays have several layers of protection to detect and trap unknown variants. PCMag.com has a lot of reviews, for instance, Norton 360 Everywhere, Webroot SecureAnywhere Complete, and Bitdefender Total Security 2012.
"Install antivirus from a company that you know and trust, and keep it up to date," wrote Rains.
It's not just security software that needs to be kept up-to-date. Operating system and other commonly used software, such as Flash, Reader, Java, Microsoft Office, Web browsers, among others, should be regularly updated. "Use automatic updating to keep your operating system and software up to date," Rains added.
Many companies are moving towards automatic updates. Turn it on, or run the install from within the application to avoid getting caught by fake update warnings.
Going back to the first point, the security software should come from legitimate sources, as well. Researchers at GFI Software last week identified a Twitter campaign promoting antivirus applications. The problem was, these "must-see" tools were actually scareware. Unsuspecting users who clicked on these links wound up downloading and installing fake antivirus which claimed to find tons of issues with the computer. Some of these links actually directed users to sites boobytrapped with the Blackhole exploit kit to download additional malware before recommending that users download "Windows Antivirus Patch" to remove the infection, GFI warned. The catch in this and other scareware scams, is that the user ponies up (often for $79) for a paid version that does nothing.
Cyber-criminals are crafty and are always working on ways to trick users into downloading their applications. Don't make it so easy for them.
Commercial Engineering is very similar to Industrial Engineering, although it focuses more on the economic and business application of the ...CommercialDegree.com
Đăng ký:
Đăng Nhận xét (Atom)
Bài đăng phổ biến
-
Want a little alert to pop up on your desktop whenever a new Gmail message arrives? Easily done, but you’ll need the right browser first. ...
-
Don’t hold your breath, but Google seems to be connecting the pieces of the authorship puzzle – one social network at a time. I stumbled up...
-
Cara Aman Alami Membesarkan Payudara dengan Herbal dan Pijatan Pijatan tangan sendiri Teknik Memijat Payudara ini praktekkan secara teratur ...
-
One of the first lines of defense we have against the plague of security and privacy problems that stalk the internet resides within our b...
-
Choosing a domain name for your blog is a very important decision, and if you don't choose well, you could be dooming your blog from t...
-
Pernah datang di sebuah file Windows format arsip yang tidak biasa yang utilitas pengarsipan favorit Anda tidak bisa membongkar ? Sebagian b...
-
Earlier this month, I showed you how to zoom in on the entire display of your iPhone—a handy trick, especially for anyone with iffy eyesigh...
-
Driving traffic can be confusing, can’t it? Everyone seems to be wanting to sell their “latest and greatest” method of driving traffic. One...
-
Whether you’re you building a site or a blog, keyword research is definitely the first thing you need to consider. You can be sure that if ...
-
Whether you’re running the simplest blog or an enormous international ecommerce site, you should be measuring how visitors interact with yo...
Không có nhận xét nào:
Đăng nhận xét