• info@manhtu.com.vn
  • (083) 9350079 - Hotline: 0912 78 79 38
  • cuu du lieu cuu du lieu
Nguy co tu malware va cach phong tranh - Risk from malware and how to avoid | CứuDữLiệu.com

Network security

Risk from malware and how to avoid

At the present time, it's hard to believe that the low-level code can still run on the computer underground without being detected. The government also recognizes the measures

At the present time, it's hard to believe that the low-level code can still run on the computer underground without being detected. The government also recognizes the current defensive measures are not enough and they can easily lose control of the intranet or websites into the hands of others. This article will focus on the recent emerging malware threats and proposed solutions can be used to deal with this threat.

Along with the development of technology, the software developers also offer warnings and also implemented additional security measures to ensure that their products are protected. However, the threat caused by malware not so reduced. As the countermeasure was born, the bad guys are back for more sophisticated and complex system vulnerability to intrusion. Now they can even fake software and service updates, instead of patches and security software, malware is downloaded and installed on your system.

malware

malware


The new attack vectors are being developed to suit the era of social networks, such as the spread of social networking sites. In addition, previous similar attacks are causing heavy losses. The traditional virus has are secretly infected file, affecting the operation of the computer and can turn our computer server to infect on the site as well as other computers and networks.

Malware can be described as follows:

    
Advertising (Adware): Place the ads on the computer screen in a variety of different media.
    
Spyware (Spyware): This is used to collect information and data on your computer and redirects to another address. Information such as personal information, browser history, login names and passwords and credit card numbers.
    
Hijackers: Hijackers target Internet Explorer. We take full control of the web browser, including the home page, search page and search bar. They redirect you to the site that you want to access.
    
Toolbar: A toolbar is installed through means clearly not entail a variety of malware.
    
Dialer: The modem configuration change to go to a certain number of devices increases phone bills, causing damage to users at the same time make a profit for the bad guys.
    
Deepware: This is a new term to refer to malicious activities more deeply into the OS and acts like a rootkit very low, almost can not be detected by normal antivirus programs.

Impact of malware on your computer

    
Slow connection.
    
Slow, error caused by malware.
    
Causing continuous display error messages.
    
Can not shut down or restart the computer when certain cleaning maintenance for process activities.
    
Bad guys take advantage of malware to collect personal information or data from the computer.
    
"Pirates" browser, which redirects the user to the intended site.
    
Infect your PC and use as a broadcast host many different file or perform other attacks.
    
Sending spam and to user mailbox.
    
Send email to impersonate the user, causing trouble for users or companies.
    
Control systems and resources for attackers.
    
Rise to the new toolbar.
    
Create new icons on your desktop.
    
Implicit and difficult to detect if it is good programming.

Featured malware

In a few months ago, the malware has been identified. Latest malware include:

    
Flame
    
Flashback Trojan
    
Trojan.Win32.Generic
    
Artemis Trojan
    
Scrinject.b

Flame

New Flame was discovered in May. It is also known under the name Flamer or Skywiper and is believed to have emerged from two years ago but just been discovered until recently. With more than 1000 initial attacks on a variety of computer-governmental organizations, educational institutions and individuals, Flame was described as the most sophisticated malware ever discovered.

Flame is the first malware using encryption techniques, attacks prefix conflict, allowing the virus to forge authentication of digital information to spread. This type of malware to attack computers running the Microsoft Windows operating system and easily spread to other machines via LAN or USB. Flame data collected through recordings, photographs, works on keyboard, conversation on Skype and network traffic. It is also used to host a Bluetooth station can try to download the information from Bluetooth enabled devices around. All data collected is sent to the command and control server settings around the world. After you're done, all traces of the malware clean from Flame-supported computer a Kill command in it.

Most ominously of this malware is that it covert operation that can not be detected but still silently gather important information. Harmful levels of it can be endless thanks to the modular structure, after infecting a PC with malware beginning, more modules can easily be added to make the different purposes.
Flashback Trojan

The absolute safety of users Apple is only a past. Years ago, the attacks aimed at Apple users by worms, viruses and hackers are very small. Flashback Trojan, was first discovered in late 2011 has been described as the worst security disaster happened on the Mac. The attack on the global and Macbook running Mac OS X platform has achieved a huge number of victims, more than 600,000 devices and no signs of decline.

Trojan targeting vulnerabilities on Mac OS X. A user is redirected to a fake site that JavaScript code to download an application. An executable file is stored on your computer can download and run malicious code on the device. Who controls Trojan has the ability to do anything he wants on the infected computers.

The rise of users of Apple makes these devices become excellent targets for attacks. Hacker will surely continue to look for flaws or intrusion systems.
Trojan.Win32.Generic

This type of Trojan is ranked in the top 10 most powerful malware infection recently and is the most powerful malware spread in short time. Trojan.Win32.Generic computer intrusion through backdoors, install and destructive conduct. It is taking advantage of the holes in the computer software to grant remote access to hackers to host.
Artemis Trojan

Artemis Trojan has the ability to spread on your computer then displays false information as fake security websites. Despite appearing a few years ago but this Trojan suddenly increased activity this year. The biggest problem in dealing with Artemis is in many cases, the antivirus program can not determine if it really is a virus or not.
Scrinject.b

When moving data into the cloud is mainstream this day, this is really a cause for concern. Scrinject.b is a cloud-based malware. It is capable of collecting data on a global scale.
Steps to prevent malware

Activate and always maintain a firewall. If you do not believe in firewall features on the OS, you can also try one of the many network firewall.

    
Update your computer regularly.
    
Update anti-virus and anti-spyware / malware.
    
Browsing safety, security settings for the browser enough to detect invalid download.
    
Install anti-spyware programs on board, so all programs are not perfect and can compensate for each other. The combination of the program will detect a wider range of malware.
    
Monitoring computer. Perform regular virus scans.

    
After installing the new software should always perform a virus scan on your computer.
    
Be careful when installing software. We often do not read the EULA accepted quickly click install. It is best to read the EULA and to ensure that any intermediate software to install is safe.
    
Understanding malware. Make sure you stay up to date with the latest information about malware.
    
Regular backup of data, preparing in case the computer crashed.
    
Do not click on links or attachments in email unless sure of their contents.
    
Download and install software from trusted websites.
    
Use the pop-ip program and do not click on any link in the pop-up.
    
Use the sandbox for testing the program. If the download application but not sure about safety, go install sandbox ahead to test ..
    
Check the false discovery processes and service. This is simple enough to make, but you should make a habit of regularly conducted to make sure nothing runs in the background on your computer.
    
Using virtual machines for software is not clear, just like a sandbox.

Conclusion

The motivation behind malware has changed a lot over time. The first version of malware developed only for the purpose of teasing rather than with the specific intent to cause harm. Things have changed and the bad guys trying to develop malware for a special purpose, such as money or collect important information. But users also have the methods to protect themselves against malware, follow the steps mentioned above.

Malware is still a part of today's computing world. When the study was conducted to try to develop quickly the tools to deal with them, it's time malware created to develop new programs and find new ways to infect our system. And chase will forever continue non-stop.

According WindowsSecurity


The other news