There is a lot going on in the information security space. 2011 looks to be an interesting year in these regards. Below are some things to be watchful for in 2011, some of them are good and, unfortunately, some aren’t.
First the good news:
- We are getting a lot more serious about our security. For example, new privacy laws are mandating organizations to tighten their security. Look to see more consumer privacy laws passed in the approaching year and more tightening of security systems.
- Authentication requirements are increasing. Corporations are requiring a great deal more authentication to get into secure programs (this also is on the bad news side- There is a wide range of sophisticated applications to help us be more secure and they will continue to get better. Competition right now is strong in the security industry sparking a lot of innovation.
- ISPs are now taking on the responsibility to help us with our security. Take AOL's latest commercials as a good sign that others will follow with the trend.
Now the bad news:
- Securing our networks is costing us. Most providers are globalizing their organizations making them more secure, costing a lot of money. It will get worse before it gets better.
- Authentication requirements are escalating. This is getting claustrophobic. Corporations are requiring a great deal more authentication to get into secure systems (This is also on the good news side) Unfortunately, for the end user, it is one more aspect to be unhappy about, not unlike airport security lines.
- Hackers are becoming more sophisticated. For example, Botnets are becoming more complicated and harder to capture and stop. Do a search on botnets on the Internet. They really are causing a whole lot of problems, but it does not stop there. The number of viruses and malware out there is staggering.
- Spammers keep finding more innovative ways to fill our email boxes. Don't look for this trend to stop anytime soon.
Friday, November 12, 2010
Wednesday, November 10, 2010
How To Secure Your Computer
Today, most people are using their computers for everything from communications to online banking and trading to shopping. As we do these things on a typical basis, we open ourselves to potential hackers and attackers. While some may be looking to phish your private information and identity for resale, others simply want to use your computer as a platform from which to infect other unknowing targets.
Below are a few easy, cost-effective actions you can take to make your computer more secure:
#1 Always make backups of important data and store in a safe place detached from your computer.
#2 Update and patch your operating system, web browser and programs frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate available patches for your Office programs.
#3 Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can easily access your computer from the Internet.
#4 Review your browser and email settings for optimum security. Active-X and JavaScript are often used by hackers to place malicious programs into your computer.
#5 While cookies are relatively safe in terms of security concerns, they do still monitor your movements on the Internet to build your profile . At a minimum set your security setting for the internet zone to High, and your trusted sites zone to Medium Low.
#6 Install an antivirus program and set for automatic updates to receive the most current versions.
#7 Do not open unknown email attachments.
#8 Do not run programs from unknown origins. Do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojan horse waiting to corrupt a computer.
#9 Disable hidden file name extensions. By default, the Windows operating system is set to hide file extensions for known file types. Disable this option so that file extensions display in Windows. Some file extensions will, by default, persist to remain hidden, but you are more likely to see unusual file extensions that do not belong.
#10 Disconnect from the network when not using the computer. A hacker can not assault your computer when you are disconnected from the network.
#11 Consider making a backup using an external hard drive, in case your computer is damaged or compromised by a malicious application. You need to take this step before you experience a hostile breach of your system.
By doing the above, you will certainly avoid most attacks.
Below are a few easy, cost-effective actions you can take to make your computer more secure:
#1 Always make backups of important data and store in a safe place detached from your computer.
#2 Update and patch your operating system, web browser and programs frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate available patches for your Office programs.
#3 Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can easily access your computer from the Internet.
#4 Review your browser and email settings for optimum security. Active-X and JavaScript are often used by hackers to place malicious programs into your computer.
#5 While cookies are relatively safe in terms of security concerns, they do still monitor your movements on the Internet to build your profile . At a minimum set your security setting for the internet zone to High, and your trusted sites zone to Medium Low.
#6 Install an antivirus program and set for automatic updates to receive the most current versions.
#7 Do not open unknown email attachments.
#8 Do not run programs from unknown origins. Do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojan horse waiting to corrupt a computer.
#9 Disable hidden file name extensions. By default, the Windows operating system is set to hide file extensions for known file types. Disable this option so that file extensions display in Windows. Some file extensions will, by default, persist to remain hidden, but you are more likely to see unusual file extensions that do not belong.
#10 Disconnect from the network when not using the computer. A hacker can not assault your computer when you are disconnected from the network.
#11 Consider making a backup using an external hard drive, in case your computer is damaged or compromised by a malicious application. You need to take this step before you experience a hostile breach of your system.
By doing the above, you will certainly avoid most attacks.
Monday, November 1, 2010
IS MY COMPUTER OPEN TO SPYWARE
Spyware infects more than 90% of all PCs today. These malicious programs are designed to covertly bypass firewalls and anti-virus software without the user's knowledge. Once embedded in a computer, it can wreak havoc on the systems performance while gathering your personal information.
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user's knowledge. Once downloaded, the spyware program goes to work gathering data for the spyware author's personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads which are spyware programs.
Another way that spyware can gain access to your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any undesired downloads. For example, a pop-up modeled after a ordinary Windows dialog box, may appear on your screen. The message may ask you if you would like to improve your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download including the spyware program will commence.
Some spyware applications corrupt a system by entering security holes in the Web browser or other program. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.
Spyware programs can accomplish a multitude of malicious tasks!
Spyware can:
1 Monitor your keystrokes for reporting purposes.
2 Scan files based on your hard drive.
3 Snoop through applications on your desktop.
4 Install other spyware applications into your computer.
5 Read your cookies.
6 Steal credit card numbers, passwords, and other personal information.
7 Change the default settings on your home page web browser.
8 Mutate into a second propagation of spyware thus making it more complicated to eradicate.
9 Cause your computer to run slower.
10 Deliver annoying pop up posters.
11 Add advertising links to web pages for which the author does not get paid. Instead, compensation to the spyware programmer that changed the affiliates settings.
12 Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it complicated to remove.
How can I prevent spyware?
There are a few things you can do to prevent spyware from infecting your computer or laptop system.
Invest in a reliable commercial anti-spyware program. There are several currently on the market including stand alone software programs such as Lavasofts Ad-Aware or Windows Antispyware. Other options offer the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, data processing, and removal of any found spyware software.
As with most programs, update your anti virus software frequently.
And, when all else fails?
If your computer has been contaminated with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user's knowledge. Once downloaded, the spyware program goes to work gathering data for the spyware author's personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads which are spyware programs.
Another way that spyware can gain access to your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any undesired downloads. For example, a pop-up modeled after a ordinary Windows dialog box, may appear on your screen. The message may ask you if you would like to improve your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download including the spyware program will commence.
Some spyware applications corrupt a system by entering security holes in the Web browser or other program. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.
Spyware programs can accomplish a multitude of malicious tasks!
Spyware can:
1 Monitor your keystrokes for reporting purposes.
2 Scan files based on your hard drive.
3 Snoop through applications on your desktop.
4 Install other spyware applications into your computer.
5 Read your cookies.
6 Steal credit card numbers, passwords, and other personal information.
7 Change the default settings on your home page web browser.
8 Mutate into a second propagation of spyware thus making it more complicated to eradicate.
9 Cause your computer to run slower.
10 Deliver annoying pop up posters.
11 Add advertising links to web pages for which the author does not get paid. Instead, compensation to the spyware programmer that changed the affiliates settings.
12 Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it complicated to remove.
How can I prevent spyware?
There are a few things you can do to prevent spyware from infecting your computer or laptop system.
Invest in a reliable commercial anti-spyware program. There are several currently on the market including stand alone software programs such as Lavasofts Ad-Aware or Windows Antispyware. Other options offer the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, data processing, and removal of any found spyware software.
As with most programs, update your anti virus software frequently.
And, when all else fails?
If your computer has been contaminated with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.
Subscribe to:
Posts (Atom)