When it comes to computer jargon, there are tons of different terms that many use interchangeably and improperly. One common misconception is the idea that a virus and a malware are the same thing and that an antivirus program will rid a computer of both. Unfortunately that’s not true. What is malware? Malware is a broad term that encompasses a vast amount of malicious programs designed to infect or harm a computer. Such malware includes viruses, adware, spyware, worms, and more. They all have different methods but each one has a specific target: to infect your computer. What is a virus?
As mentioned earlier a virus is actually a type of malware, but it’s quite different than the rest of the malwares. A virus’s intent is to infect your computer and cause problems (ie crashing it, preventing programs from opening, and more), but where it differs is that a virus can spread and replicate itself. Much like viruses that infect humans, the longer a virus is on a computer infecting it, the more replicas it will make of itself and the harder it will be to kill. How to get rid of malware and viruses
An antivirus program targets viruses completely while a malware program searches for a broad spectrum of malicious programs. Fortunately for you there are tons of free programs available that should effectively clear up your computer from any type of malware! Check below for the top free antivirus programs and free malware programs. Antivirus Programs:
AVG Free Avast! Comodo
Malware Programs:
Malwarebytes Spybot Search & Destory Combofix
_As more people begin using laptops, the number of laptop thefts are increasing. If your laptop computer is stolen, or if someone gains access to your files, your company, personal and financial data can be exposed. See the following tips on how to stay protected.- Don't use computer bags.
Computer bags only make it more obvious that you're carrying a laptop. The use of padded briefcases or suitcases is recommended. - Use passwords that are strong, and not kept in the computer bag.
Strong passwords make it more difficult to break into your computer deterring individuals from trying to access your files. - Encrypt data.
With the Windows Operating System, you can choose to encrypt files and folders. Which causes individuals to not be able to read data and see your information. - Keep an eye on your laptop.
Don't lose sight of your bag, such as when going through airport security. - Buy a laptop security device.
If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs and devices that will report the location of a stolen laptop. - Do not leave your laptop in a hotel room.
If you must leave your laptop in the hotel room, place the do not disturb sign on the door. - Put your name and contact info on the laptop.
In addition to putting your name on the laptop, it is also recommended that you include a, "Reward with no questions asked if returned." tag line as well. Both of these increase the chance of your laptop being returned, no matter what the circumstance.
Avoid Being Hacked Hacking is a major issue, and hackers use many tricks in an attempt to access your data. There are steps you can take to protect yourself and your data from the most common hacking methods. Anti-virus software (Norton, McAfee, Sophos, etc.)SPAM- Most spam will not cause harm, however the best practice is to delete emails from unknown sources and those with attachments. If you reply or attempt to unsubscribe, this will confirm to the spammer that your account is active and in use.
Anti-spyware- "Malware" or "spyware" are terms used to describe malicious software that can be used to cause denial of service attacks or harvest sensitive data (credit card numbers, etc.) from your computer. These programs can cause you to receive pop-up ads and/or track your web surfing habits. Attachments can be harmful to your computer and can carry malicious viruses and malware. There are tools available, such as Spybot Search and Destroy or Ad-Aware, that scan your computer and identify malware and other harmful items. Once found, these programs give you the option to delete the items. These programs also need to be updated so that you have the most current versions.
Patches, security updates, etc.- Virus writers and hackers will exploit holes in programs to gain access to your computer. To keep your computer up to date with the latest security fixes and patches, visit http://update.microsoft.com/microsoftupdate on a routine basis. If are you running an Apple or Linux machine, be sure to check routinely for updates also.
Securing Your Computer and Personal Information - Passwords
Everyone needs passwords for numerous applications, Web sites, and even to log on to computers. Passwords keep your data from being stolen by others. One of the easiest ways for someone to get to your data is to figure out your password(s). Here are some suggestions for creating a distinct password: - Make your password at least 7 characters long.
- Include letters, numbers, and special characters such as @ or $.
- Do not use information relevant to you such as names of relatives, pets, or special dates like birthdays and anniversaries.
- Change your password every 3 to 6 months.
- Do not write down your password. Memorize it.
- Do not give your password to anyone. If you give your password to another person, you may be held responsible for any actions they commit.
- Protecting Your Data
At some point, you have probably lost a document that you really needed. It is a good idea to make back-ups of your data from time to time in case you have the misfortune of losing a document. There are several ways you can do this without spending much time, effort, or money: - Backup to CD or DVD
If you have a CD or DVD burner, you can make backups of your data. This is a quick, easy, and cheap way to save your files. - Backup to Network Share (Z: Drive)
If you have a server or a network drive, you can store documents on your computer and also back them up to your network drive. This will store your documents in two separate locations. - Backup to Removable Media
You can store documents on removable media such as USB drives (also known as thumb drives, flash drives, etc.) as a backup solution. These are good places to store your data, and since they are portable, you can take your data with you. - When Not In Use
If you have to step away from your computer for a short period of time or if you are finished for the day, make sure that you secure the computer. There are three ways to do this: - Log off
Logging off of your computer is especially important in public areas such as coffee shops, libraries, schools, etc. Logging off prevents anyone from using the computer under your username. - Lock your computer
When you are leaving your computer for a short period of time, locking the computer will keep someone else from using it. To carry out this function press CTRL-ALT-DEL and click the "Lock Computer" button. This option is not available in the Winthrop computer labs. - Turn off your computer
Turning off the computer is the most secure way to prevent unauthorized access. If the computer is not on, no one will be able to connect to it remotely and carry out any malicious actions. - Identify Theft
You should adopt sound practices when using email and other forms of communication on your computer to protect yourself from identity theft. Never give out personal information such as your social security number, bank account numbers, or passwords. You are strongly advised against providing other personal information such as your home address and phone number.
Downloading Content
Knowing how to use your computer responsibly is important to protect both yourself and those arround you. P2P or peer-to-peer programs have made news recently across the nation. Suits are being filed against users regarding illegal activity such as improper music downloads. We strongly suggests that you do not use peer-to-peer programs.
Always respect copyright laws. This includes printed and digital material. Do not engage in illicit music, video, or movie downloads. Please be aware that the infringement of copyrighted music, videos, or movies can be punished by up to five years in prison and $250,000 in fines. Repeat offenders can be imprisoned up to ten years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright.
Also, please be advised that all telecoms and internet providers will notify the appropriate authorities whenever requests are made by the Recording Industry Association of America or any other legitimate enforcement or monitoring entity.
Social Networking (Facebook, MySpace, etc.) Social networking through the use of such services as Facebook have become part of everyday life for many of us. These types of networks can be used to find others with common interests, share personal information, and communicate with friends. While cyber communities can be used in positive ways, it is important to use common sense and keep several key thoughts in mind: - The information you place online can influence your future. Pictures that may demonstrate behaviors that are questionable or suggestive can be viewed by anyone on the Internet, including possible future employers. There have been instances where graduates have had their Facebook page called up during the interview process.
- Making your information private does not mean that others are unable to view the material. Hackers have many tricks that enable them to view what is thought by you to be off limits. You should also remember that pictures or other information posted for a short period of time and then removed by you may have been downloaded by others and exist in cyberspace for years to come.
- Be safe. Use common sense when entering information on Web sites. There is the illusion that your information is there for only your friends to view but realize that your information can be passed on to others that may not have your well being in mind. It is strongly suggested that you do not post information such as phone numbers or your place of residence.
- Think about how you represent yourself and others. It is not only important to take note of what you say about yourself online but equally important are the comments you make about others. You do not want to face alleged violations that claim inappropriate behavior on your part.
Here are some tips to ensure malware is not given access to your computer: - Keep your computer up to date.
- Keep your browser up to date.
- Install a good antimalware program (Like Microsoft's own Security Essentials)
- Download free software only from sites you know and trust.
- Avoid clicking links inside pop-up windows.
- If you are offered antimalware programs while browsing, don’t install them.
Following these rules, you’ll protect yourself and decrease the chances of getting malware on your system.
A new variant of the Trojan Popureb burrows deep enough into the Windows operating system that users are recommended to reinstall the OS in order to remove it, or by fixing the master boot record, Microsoft said. The "Popureb" Trojan corrupts the hard drive's master boot record to such an extent that the only way to remove it is to run Windows Recovery Console to rewrite the sectors to a clean state, Microsoft Malware Protection Center engineer Chun Feng wrote in an advisory posted on the Threat Research and Reponse blog June 22. The Trojan was updated recently with the driver component that makes sure the malware can never be modified by an external process, according to Feng. The component accesses the DriverStartIO routine in the device driver to execute itself. Trojan:Win32/Popureb.E overwrites the first sector on the hard drive so that it triggers at boot time. MBR is generally invisible to both the operating system and security software. To ensure it can't easily be removed, Popureb can intercept all commands to overwrite the MBR or any other part of the hard drive where the malware is installed and replace those commands with a read command. The operation appears to succeed and no errors are thrown, but no new data is actually written to the disk. This means that if a security software attempts to remove the malware, it fails automatically because it can't overwrite the MBR or the infected sector. Most members of this particular malware family are fake antivirus software, but this variant "might be a little more severe, Symantec said, but pointed out that this Trojan doesn't do anything that "Trojan.Tidserv doesn't already do." The company has asked Microsoft for the sample to analyze further, according to the statement.
"How to Protect Your Network from Hacker Bots"Not all hackers are only after your data. The real prize is your wallet. To carry our cyber-crimes, many hackers will use email spam, phishing attacks, or insidious websites to infect computers and turn them into "Hacker Bots." These Hacker Bots become drones that can be controlled remotely by cyber criminals, unleashing attacks on businesses that generate a steady revenue stream for the criminals. A Trend Micro study recently found that roughly 25% of all infected computers belonged to businesses. It's often hard to know for sure whether your computer has been turned into a Hacker Bot. The best solution you can take is to contact a security expert to fully assess the machine. Before you call a security expert, there are a few initial steps you can take: - Disconnect the potentially infected computer from the Internet. If the computer is infected, this step will immediately stop data from being stolen, and prevent attacks on other businesses.
- Search for any sensitive data on the potentially infected machine and move it to a clean computer. Another option is to move the data to an external hard drive for safe keeping.
- Clean the potentially infected computer using antivirus software. You can also hire a professional to utilize advanced tools to ensure a complete quarantine of your machine.
If you don't yet believe any of your machines are infected, you are in a great spot. Prevention is the best cure and is much easier and cost-effective to implement long-term. You can start by ensuring that your antivirus definitions are always updated and you download the latest security patches for Windows and the programs you run on Windows. You can also outsource your security maintenance to a company such as ourselves who can professionally perform monthly work on your machines remotely to ensure they are as padlock safe as possible. This saves you the time and headache of having to do the work yourself, and will also give you peace of mind knowing that your data is professionally secure.
Cybercriminals are circulating a new piece of fake security software that spoofs a Microsoft security tool. It’s called the “MS Removal Tool.” When you start your computer, you see a MS Removal Tool window that restricts you from accessing your desktop. You cannot start Task Manager, and you cannot open Internet Explorer or any other programs. This situation is the result of malware (a variant of Win32/Winwebsec) that is infecting your computer. If you see a pop-up ad or an email for the “MS Removal Tool,” ignore it. If you already have this malware on your computer, you might not be able to access Internet Explorer or any other programs. As always, we highly recommend our users having their computers up to date and running a good antivirus application.A good and free choice is Microsoft's own Microsoft Security Essentials. If you can access Internet Explorer or another web browser, you can also use the Microsoft Safety Scanner to scan your computer and remove the MS Removal Tool. Be safe!
|