Saturday, April 5, 2014

Types of Malware to Be Aware Of


Computers, laptops and even smartphones are constantly exposed to different malicious programs aimed at causing various damages to the system. These nasty programs are generically known as malware. Malicious software (or shortly malware) is any type of software which can be harmful for your computer. Let's have a closer look at the most common malware types you should be watchful of.
Bots and Trojans
A Bot (short for Robot) is an automated program which allows your computer to be operated by other users. Generally, this malicious software infects several computers which allows sending a huge amount of spam email messages or executing Denial of Service attacks.
A Trojan (short for Trojan Horse) can be contracted with an email message or a usual file download. This software inserts a so-called backdoor to the system making it accessible to the unauthorized users.
Adware and Spyware
Adware and spyware programs are usually contracted when surfing the Internet. The main aim of adware is to expose Net surfers to commercial ads. For example, adware may cause a browser directing you to websites you did not plan visiting, or may trigger the appearance of pop-up advertisements on your computer. Generally, this malware is not dangerous, but its effects can be quite annoying.
Contrary to adware, spyware can be extremely harmful. This piece of software steals information from your PC and sends it to a third party. Spyware may steal your personal or financial information, passwords, bank account details, fax/telephone numbers, addresses, etc. At the same time it can collect information about your browsing habits. This may be information about the sites you visit or files you download.
Viruses
Viruses are the most common malicious programs which have been around for quite a long period of time. Several decades ago viruses were mainly distributed by means of physical media, like floppy disks. However, in the days of Internet technology viruses are distributed online (via hidden documents or email attachments). At the same time, this type of malware can be contracted anytime you connect any type of physical storage (MP3s, flash memory sticks, etc) to your computer. The effects of catching computer viruses can be different, from minor annoying troubles to the severe damages of files and hardware.
Keyloggers
This type of malicious software is extremely dangerous, as it helps executing the most harmful online activity - identity theft. A keylogger records everything computer owner types on the keyboard. This software allows cybercriminals getting access to passwords, logins, bank account information and codes a computer owner uses to access secure information.
With a wide variety of malicious programs ready to attack your PC, you need to learn how to protect yourself and your computer.
To protect your PC from the intrusion of malware it is necessary having a reliable antiviral program. Visit http://malwarelist.net/ to learn more on different types of computer security software.

What Malware Can Do


If you own a small to medium size business you need to be aware of malware. Also called spyware, malware is a devious software program that covertly installs itself on your computer and then performs secret tasks without your permission or knowledge. Malware and spyware used to secretly observe and log web surfing habits of computer users and spawned other programs such as adware, Trojans and worms. However, malware has evolved to do much more harm than observe your web habits.
Chances are your business uses computers and in turn employees will be on the internet. The web has become integral to how society and business operate today and it is essential to know the dangers that lurk in this Wild West frontier. Malware can invade your computer system a number of ways including emails, game demos, MP3 players and just about anything you download from a web page. Anyone in your office has the ability to unknowingly download a malware program and when this happens you may not know until the damage is done.
Malware can be programmed to do a number of tasks in your operating system but the most common functions include stealing personal information, overloading your browser with pop-up ads, spamming your inbox with advertising mail, slowing down your internet connection and in some cases crashing your system. These are only the basics of a malware program and a more serious hacker can create a program that can use your computer as a cloaked server, essentially making your computer a dummy for their own personal use. From this server they can do any number of illegal activities including credit card fraud, identity theft and broadcasting adult videos. This is a serious issue because when the authorities look for the culprit guess whose computer they are led to... yours.
Banning the use of the internet is not a realistic solution. Without access to the web you are going back to the dark ages and will suffer from lack of information. However, there are programs you can install that will protect your system from malware and also block sites that are known to download such viruses. You also need to make employees aware of guidelines for using the internet.
Opening emails from senders you don't recognize is a big no-no as is visiting sites that are used for gambling, pharmaceuticals and adult entertainment. What employees do on their own time is their business but when on the clock at your company they need to know the damage that can occur from their web browsing habits and that they are liable if found to be the cause of malware infecting your system.

Top 6 Tips to Avoid Identity Theft While Shopping Online

Online shoppers are getting savvy these days and they expect the online shopping experience to be seamless. However, malicious programs that steal your personal information have grown from 1 million in 2007 to about 130 million. On top of that, there are almost 12 million identity fraud victims in the US, annually. How can you avoid being a victim? Keep yourself safe online while shopping by using these 6 tips for avoiding identity theft.
Avoid the Lure
Phishing is a term I'm sure you've heard before, but what does it really mean? Just as a fisherman will bait his hook with a tasty worm, so will cybercriminals bait e-mails with tempting offers in an attempt to have you divulge sensitive information such as usernames, passwords, and credit card details. The "bait" is a malicious link in an e-mail that leads to a spoofed website. Avoid getting caught by not clicking any links in the suspicious e-mail, by not giving out any sensitive information via e-mail, and by looking in the lower left hand corner of most browsers. There you can find a preview of where the link will take you.
Get Protection for Your Computer
An unprotected computer can be infected by malware in as little as five minutes while connected to the Internet. Protect your computer and yourself by purchasing anti-virus software. Free anti-virus software is better than nothing, but go for a paid product that performs automatic scans and updates its threat database several times per day.
Use OpenDNS
Every website has a human-readable web address (like http://www.google.com ). It also has a computer-readable address, known as an IP address (74.125.30.105). Your ISP's DNS server does the translation. What it doesn't do is protect you from phishing. OpenDNS blocks phishing websites from loading on your computer using data from Phishtank, a community site.
Create Strong and Unique Passwords for Every Site
Check out this list of the most hackable passwords on the internet:
  • password
  • 123456
  • qwerty
  • Pet Names
  • Place of Birth
  • First Names (of family members or partner)
I am going to show you how to create a very strong password and it will be easy to remember. Create or pick a random sentence, now remove the spaces from the sentence, and then begin to change letters for numbers and change capitalization. In this case, an example is worth a thousand words:
  • An example is worth a thousand words - My initial sentence
  • Anexampleisworthathousandwords - I've taken the spaces out
  • An3xample1$worth1oooWurd$ - Now I'm substituting numbers and symbols for letters
  • N3xmple1$worth1oooWurd$ - Continue the process until you have a strong password
  • An online password checker rated this as "Best" (the highest rating available).
Find the Padlock
Locks are great for protecting valuable items from theft, which is why you should always look for the padlock in your browser while shopping or banking online. Look in the address bar for the padlock and "https:" prefix. Those items mean that your connection to the website is encrypted, usually with 256 bit encryption.
Avoid Public Networks
Public networks don't encrypt their connection so a cyber criminal could be intercepting your passwords and credit details. Save your online shopping for when you are on your own secured network at home.
Avoid the crowds and hassle by shopping online but be smart. Put these 6 tips into practice to enjoy a seamless shopping experience and avoid becoming a victim of identity theft.