Table of Contents
Technology has of course made our life smoother and better but with every new development in technology there also develops a new technology to infect them. Hackers to meet out their vested interests are finding out new and smarter ways. The growth in new and more powerful Malwares is increasing day by day with newer form coming out from every nook and corner of the dark world.
Now, what is a Malware?
Malware is the short for malicious software. It is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.
For Your Help:
Here are 10 of the most common malwares and their preventions as compiled by Norton.com:
* Make use of anti-virus software and keep it updated
* Avoid visiting unknown sites and never follow random links
* Access your emails through trusted sources
* Have a backup of your data in remote media such as CDs/DVDs
* Keep up to date on new virus techniques
* Try to install spam blocking software and keep it updated
* Do not respond to spam mails
* Never click on URL links within IM if they are not from a known source
* Cancel all instant messages from unknown source
Spyware is software that gets installed into the system without user’s knowledge. It can monitor user actions or can restrict user’s control over a system. Spyware tries to remain unnoticed, either by actively hiding or not making its presence on computer. Spyware can collect personal data like credit card details, username or pass words, website visited. It can also install other malwares, redirect web browsers to malicious websites, and change computer settings.
* Use popular anti-spyware programs like Spybot – Search & Destroy, PC Tools’ Spyware Doctor Symantec, McAfee, and Zone Alarm, these programs acts as anti-virus software and scan all incoming network traffic and block threats that are detected
* Do daily, weekly, or monthly scans of your system to detect and eliminate any spyware that are being installed
* Configure the firewall in the internet security program to avoid unwanted requests for outbound communication
[useful_banner_manager banners=24 count=1]
SPOOFING, PHISHING AND PHARMING
Spoofing is an attack where program or person pretense to be someone else.
Phishing is another kind of spoofing where a fake website is created that just appears as a legal websites. This fake websites are under the control of the hacker and they can collect your credit card details, passwords, names, and other sensitive information. Phishing is mainly done through email or instant message. Some email claims to be from a legal source but when you click on the given link, you will enter into the fake web page.
Pharming is an attack in which an attacker redirects website’s traffic to another phony website. Pharming can be done either through changing the hosts file on a victim’s system or through exploitation of vulnerability in DNS server software.
* As spoofing, phishing, and pharming depend on tricking users rather than advanced technology, the best way to deal the threat is through vigilance
* Never access emails from unknown sources or click on links embedded in suspect messages
* Check out the security guidelines of websites such as PayPal to get an awareness of legitimate and fake emails
* As worms multiply by exploiting vulnerabilities in operating systems, computers should be updated with security software or patches
* Keep anti-virus and anti-spyware software updated
* Users should not open emails from unknown sources and never run attached programs or files or visit the sites that are related to such emails
* Make use of anti-spyware programs like Spybot – Search & Destroy
* Keep your anti-virus software or patches updated
Botnet is a group of software robots, or bots that run programmed task on the internet. The term botnet refers to a disturbed network of compromised computers, which is called as Zombie computers. These Zombies run programs like Trojan horses, backdoors and worms. Botnet are used to start Distributed Denial-of-Service (DDoS) attacks against websites.
* Security measures such as FireEye, Simplicita, Damballa, Symantec, and Trend Micro can be used to prevent botnets.
* Keep the anti-virus software updated
* Use anti-virus software to detect and remove Trojan horse automatically
Keylogger is a software program that is installed by Trojan horse or virus on a computer. This will record and capture user keystrokes. The captured data is then transmitted to a remote system. Though keyloggers can not damage the computer system, it should be treated as a serious threat.
* Use anti-keylogging software such as ‘signature’ to detect and remove keyloggers
* Users should be aware of the programs that are installed on their system
* Use network monitors so that the users get alerted whenever an application tries to make a network connection.
* Assign a separate emergency block of IP addresses for the servers
* Routers and Switches can be configured to cut off traffic and avoid the DoS attack.
* Intrusion-prevention systems are efficient when the attacks have signatures linked with them.
Learn from real practitioners not just trainers.
Table of Contents