SECURITY

A Malware Primer

12/12/2012 9:07:05 AM

Recognize & prepare for online threats

Malware, short for malicious software, is a term used to cover all types of programs that attempt to gain unauthorized access to your PC, steal information, and interrupt computer operations. One of the best ways to avoid being tricked by the different types of malware is to know what the software does and how it’s likely to gain access to your computer. Here, we’ll examine the most popular types of malware, and explain why you need multiple security software tools in your anti-malware arsenal.

How does malware get in?

Whatever the type of malicious software, it must first find a way into your computer. Many viruses and spyware are able to find a way through by embedding themselves into Internet traffic, which is smart: After all, Internet traffic typically appears legitimate to a firewall (a device or software designed to detect illegitimate traffic). For example, consider a virus that’s been attached to an email. Most firewalls are incapable of examining the actual contents of an email, so the virus, with the email to which it’s attached, would pass through your security unquestioned.

How does malware get in?

How does malware get in?

Other ways of bypassing security via Internet traffic include embedding malware in pop-up ads and Flash video content, as well as taking advantage of existing vulnerabilities in your Web browser and operating system. Continually installing updates for your operating system and Web browser will help to ensure that any old security loopholes won’t affect your computer. For instance, many hackers still use the Conficker worm, which utilized a vulnerability in Windows to infect millions of computers in 2008, because some people refuse - or simply don’t know enough to - update their PCs.

Viruses

These are designed to cause general chaos on your computer. If you’re a victim of a virus, you’ll generally know right away. Some common effects include corrupting files and the deletion of important files that are required for Windows to operate. Before these types of issues occur, it’s likely that a virus will attempt to try and take over your PC so that it can download other viruses or use your computer to infect others. For instance, a hacker may access your email client and send to all of your friends and colleagues emails that include a link to a malicious file or website.

Routers feature virtual ports that hackers will try to scan for vulnerabilities as a way of getting into your system

Routers feature virtual ports that hackers will try to scan for vulnerabilities as a way of getting into your system

One of the best ways to avoid viruses is by using security software that offers multiple ways to detect viruses. For example, some security programs use both signature-based databases and heuristic types of detection, so the software can reference existing virus rules and patterns to discover known viruses and variants, and block the file or program from running before it has a chance to infect your computer.

The BSOD (Blue Screen Of Death) can be indicative of a hardware or compatibility problem, but it can also be caused by a virus

The BSOD (Blue Screen Of Death) can be indicative of a hardware or compatibility problem, but it can also be caused by a virus

Rootkits

A rootkit is a type of virus that allows low-level access to your system while disabling your security software in order to pave the way for a hacker (or another virus) to enter your system. A rootkit can even attempt to prevent you from re-enabling your security software or running security software that would detect and remove the rootkit and any associated malware. A rootkit may even block any downloads on your PC, so that you couldn’t even download another application to remove it. Thus, it can be extremely difficult to remove a rootkit once it’s established a presence on your PC. There are good anti-rootkit tools available (many of which are free), and you may be able to remove the rootkit by using a different computer to download the anti-rootkit tool and then running it on the infected machine. Sometimes, though, the best way to remove the problem is to completely reinstall Windows.

Spyware

Similar to a rootkit, spyware applications hide themselves in your PC. But unlike a rootkit, spyware makes no obvious changes to your PC. Instead, it’s designed to monitor your key-presses, the websites you visit, and other activities to collect the data necessary to break into your personal, financial, and work accounts. Once the information has been gathered, it’s sent from your PC to criminal who will either use the data to access your accounts and attempt to steal your identity or who will sell the information to someone else who intends to do so. The best way to stop spyware is by using security software with an anti-spyware component. Typically, anti-spyware will actively block spyware from installing itself and will also scan for and remove any existing spyware.

Spam

We’ve all come to expect a bit of spam in our email accounts, and it’s important that we learn to avoid suspect messages, because the email may be infected with malware. Perhaps the most dangerous types of spam are phishing emails: messages that pretend to be from an official, known, or trustworthy sender. The usual goal of a phishing attack is to try and trick you into sending personal information, such as usernames, passwords, and credit card numbers. (Or to click on a link that then takes you to a site that requests this information). Security software with an anti-spam utility is the easiest way to avoid dangerous spam, because it will filter the messages from your email client.

A sweet suite

Although you can download or buy individual applications that will guard against all of the malware we’ve covered here, it’s generally easier and safer if you invest in a security suite that covers everything you need to protect the computers on your network.

You should also ensure that Windows itself is current, to help avoid any vulnerabilities that hackers may have previously discovered

You should also ensure that Windows itself is current, to help avoid any vulnerabilities that hackers may have previously discovered

Malware Terminology

·         Virus:

A program designed to interrupt your ability to use the PC, whether via a crash, lost files, or a corrupted Web browser.

·         Spyware:

Monitors what you do and type on your computer in order to gather data that will let hackers break into your accounts.

·         Rootkit:

This malware shuts down your computer’s security software and tries to block you from changing any settings or fixing the problems it causes.

·         Spam:

Unasked-for emails, some of which may link you to malicious, infected content.

Protect your tablet & smartphone

With an active connection to the Internet, tablets and smartphones are also vulnerable to malware. For example, malicious versions of Super Mario Bros and Grand Theft Auto recently got past Google’s Play Store and were downloaded by up to 100,000 people. The rise in the availability of mobile devices also makes them a target for cybercriminals. In recognition of this shift, many security suites now come with a smartphone or tablet app, in addition to desktop applications. With many such programs, you’re allowed to install the security app onto multiple mobile devices, so you won’t have to worry about licensing for each individual smartphone or tablet.

Keep your Web browser up-to-date, so that old, already-resolved security issues don’t leave you at risk

Keep your Web browser up-to-date, so that old, already-resolved security issues don’t leave you at risk

 

Other  
 
Top 10
Review : Sigma 24mm f/1.4 DG HSM Art
Review : Canon EF11-24mm f/4L USM
Review : Creative Sound Blaster Roar 2
Review : Philips Fidelio M2L
Review : Alienware 17 - Dell's Alienware laptops
Review Smartwatch : Wellograph
Review : Xiaomi Redmi 2
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8