Showing posts with label spyware removal. Show all posts
Showing posts with label spyware removal. Show all posts

Thursday, March 17, 2011

Trojan Horses Are Still Lives - Threat For Your PC

The Trojan horse still lives. Never download an unsolicited email attachment, as it may be embedded with the deadly Trojan virus, which could wreak havoc on your computer.

Recently in San Francisco, Uri Rivner, head of new technologies at RSA, the security division of EMC, said Trojan horse is a destructive program that masquerades as a benign application. It even puts online banking passwords at risk.

Rivner said Trojans are highly sophisticated, easy to use malware (malicious software) and don't cost much. Their distribution is also quite simple. The infection mechanism is very effective. It can get into your computer system if you go to a hijacked, but legitimate-looking website or if you are tricked into downloading a link or email attachment.

fix trojan with Brainbytetech.com

Once in the computer, it can give the malware creator complete remote control of your machine. The virus may sit dormant until you visit the website of a bank or a credit card company or other financial institution, whereupon it secretly records the passwords, account details and other confidential information.

A Trojan Virus can record every keyboard stroke of the user. The stolen details are then sent back to the Trojan operator, who uses them in online fraud scams like transferring money from banks.

Rivner says the two most dangerous Trojans are Zeus and SpyEye. Millions of computers across the world are infected by these Trojans. These two malwares are now merging. SpyEye is taking over Zeus operations, Rivner adds.

Rivner says cyber criminals know that it's hard to take on the bank's systems, so they attack the weakest link in the chain, that is, the online bank customers. The new Trojan virus can empty bank accounts without the owner knowing about the theft, as it shows him fake statements or gives him an illusion that everything is in order.

It's only when he goes to the ATM to collect cash or when he gets the hard copy of the bank statement that the reality dawns on him.

However, Rivner says it is relatively easy to protect against Trojan attacks by installing antivirus software and keeping it up to date. Users should keep their anti-spyware and firewalls set to the highest level.

But more importantly, computer users should be more circumspect when receiving an email or a download. "Even if you receive a link from a friend, be a little suspicious,"
he cautions.

Local Money Mules

Many of the cyber criminals carrying out this type of fraud are located abroad, so they need a local money mule to send them the funds overseas. A mule is a person who allows his bank account to be used by fraudsters to transfer illicit gains to overseas accounts.

A mule account is a legal bank account held by a real customer. He says many such mules are job seekers, who are promised handsome commissions in exchange for channelling funds overseas.

"Once recruited, the mule will receive the stolen funds in his account. He is then required to withdraw the funds and send them abroad, using a legitimate money transfer service. Often the mules are innocent victims. They believe they are working for a legitimate business,"
says Rivner.

Rivner says banks are aware of this malware. They have put in place better authentication methods and defence mechanisms to keep out fraudsters. One of them is to send a tracker id number or code number to the online bank customer on his mobile phone via SMS.


It asks the customer to fill that number on the web page while transferring any amount through Net banking. So even if an attacker piggybacks on that session via the Trojan to make any fraudulent transaction, he can't finish the process till he has furnished the code number.


And under no circumstances will he have this crucial code number unless he has also stolen your mobile phone along with hijacking your web page. "So netbanking can be made safe," Rivner says.

Wednesday, February 9, 2011

McAfee Warns - "Malware Is on the Move"

Mobile operating systems are the new favorite target of malware, and social engineering remains the favorite old standby for launching attacks. Tried-and-true preventive care works best.
"Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update,"
advises UVa security expert Karen McDowell.

Cybercriminals are following innocent consumers away from email Increase sales with VerticalResponse. Free trial. and toward more popular, smartphone-style platforms, McAfee reported Tuesday.
"New mobile malware in 2010 increased by 46 percent compared with 2009," noted McAfee spokesperson Joris Evers.

Among the likeliest targets in 2010, Symbian and Android platforms were splattered by Trojans and bots with names like "SymbOS/Zitmo.A" and "Android/Geinimi."

"Consumers need to realize that mobiles, whether smartphone or tablet, are mini computers," said David Gorodyansky, CEO of AnchorFree. "This means all the vulnerabilities of a computer exist, often with a less-protected OS."

"From a hacker's point of view, the large user base created by wide scale adoption of iOS (iPhone) and Android will increasingly make these platforms a target, and I definitely expect to see some high-profile mobile attacks in the coming year,"
Cenzic CMO Mandeep Khera told TechNewsWorld.

"Smartphone access should be a concern to corporations that don't want employees accessing company secrets via unsecured mobile networks," Khera told TechNewsWorld. "For consumers, as banks and e-commerce sites deploy apps that give customers unprecedented access to their bank accounts, security Enterprise Payment Security 2.0 Whitepaper from CyberSource becomes more important than ever."

Unlike their mobile partners in crime, spam bots -- including Bredolab, Lethic, Xarvester, and parts of the Zeus botnet -- have gone dormant in droves this year,.

"Concurrently, spam accounted for 80 percent of total email traffic in Q4 2010, the lowest point since the first quarter of 2007," McAfee's Evers told TechNewsWorld.

The Bot Pack


Like a flu pandemic, botnet infections were particularly acute in Q4 2010, with Rustock, Cutwail and Bobax leading the bot pack. Social media sites, like mosquitoes, often acted as disease vectors.

"Whether we are using smartphones or computers, social engineering attacks are still the primary attack vector, and a major vector in the spread of botnet infections,"
University of Virginia information security analyst Karen McDowell, PhD, GCIH, told TechNewsWorld.

McAfee advises tablet and smartphone users to watch out for Zeus-Murofet, Conficker, and Koobface botnets specifically, and more generally, phishing URLs from the IRS, gift cards, rewards accounts, and social networking accounts.

Phishing vectors spread bot diseases when users click on phishing emails, answer phishing phone calls, or click on text messages that "appear to come from your carrier," McDowell explained, adding that tried-and-true preventive care works best. "Never give information via email, smartphone or on the Web, and verify independently before you click on any unknown text or email message, game, application or security update."

More preventive options: "Don't log onto unprotected WiFi, and use a VPN to encrypt and secure your browsing, which acts as a secure, encrypted tunnel for your communications," AnchorFree's Gorodyansky told TechNewsWorld.

Malware's Mantra


Twenty million new pieces of malware -- nearly 55,000 new malware threats every day -- plastered the cybersphere in 2010, migrating toward smartphones because "cybercriminals are keeping tabs on what's popular and what will have the biggest impact from the smallest effort," said Vincent Weafer, senior vice president of McAfee Labs.

"Think globally, act locally" might be malware's new mantra, with threats that "now tend to match the types of users, habits and events that are specific to a region," McAfee's Evers added. Global criminal favorites include AutoRun malware such as Generic!atr; banking Trojans and downloaders such as PWS or Generic.dx; and Web-based exploits such as StartPage and Exploit-MS04-028, the McAfee report claims.

To avoid malware, treat search terms and Adobe (Nasdaq: ADBE) products with extra care, McAfee advises. Of the top 100 search results, 51 percent led to malicious sites. And throughout 2010, malware developers exploited weaknesses in Flash and PDF, a trend McAfee sees continuing.

Despite the advice, pests will persist, driven to infect by "a general lack of awareness towards the need for security," Gorodyansky explained.

"This is the same as it was for computers, when most people thought they were completely safe once they installed an antivirus program," he recalled.

"It really doesn't matter what type of device is used -- the steps to secure a Web application haven't changed," Sam Shelby, e-government coordinator for the City of Columbia, Missouri, told TechNewsWorld. "You can never trust input: always authenticate, validate and sanitize input data."

courtsey-technewsworld