Tuesday, December 15, 2009

Now a little something for the PC users

So after posting about 5 anti-virus tools for mac users, I am now providing those of you that are PC users with a little something.
This article in economic times provides a little insight into what Microsoft has to offer to help protect yourself in the world of digital security.
Microsoft launches security solution for home PC users
15 Dec 2009, 2016 hrs IST, PTI

 Print   EMail   Discuss  Share  Save  Comment Text:


NEW DELHI: Software giant Microsoft today launched a security solution for its Windows operating system in the Indian

market.

'Microsoft Security Essentials', which was launched in September globally, would be available free of cost to all genuine Windows users and provide anti-virus, anti-malware and anti-spyware solutions.

"As threats like phishing, malware and spyware attacks are evolving, an effective security solution has become paramount to consumers. We have anticipated consumers' security needs and delivered a hassle free and non-intrusive form of protection to PC users," Microsoft India Consumer and Online Marketing Officer Rishi Srivastava told PTI.

Microsoft Security Essentials include tools for checking computers for infections by specific and prevalent malicious software, weekly update on Tuesdays automatically when connected to the Internet as well as validation of Windows software.

"The new offering is targetted at the home user, who often gets confused by the huge number of security solutions available in the market," Srivastava said adding that Microsoft continues to offer separate security solutions for its enterprise clients.

With a burgeoning online population of 49 million Internet users in India, threats such as hacking and phishing have also risen, which has led to financial losses to consumers as well as companies.

Saturday, December 5, 2009

5 Best Antivirus programs for Mac

Don't think I forgot about you Mac users. In this day of technology and connectivity there is more than one way to get things done. The two big players are the PC's and Mac's for computer systems. We've all heard good and bad for both systems, however, regardless, of whether you have one of the other, without proper protection and the software to take care of your systems problems are inevitbale.

As I am not an avid mac user I have found some information for those of you that are mac users and may find useful:

5 Best Antivirus Programs for Mac Computers

December 4th, 2009
ADVERTISEMENTS
Which are the best Mac antivirus programs? Whether it would be cyber life or real life, security is the most alarming issue. One can go to any extent to see him and his family safe and secure. Since computer plays a pivotal role in almost each and every human life, keeping it secured from various cyber threats is equally important.
mac-antivirus
There is misconception prevailing that Apple Macintosh users do not need an anti virus program. But remember once Apple had issued the notice:  “Apple encourages the widespread use of multiple anti-virus utilities so that virus programmers have more than one application to circumvent, thus making the whole virus writing process more difficult.”
So keep your computer powered by Mac OS safe from viruses, malware, Rootkits, Trojans and other malicious programs, because keeping our data and ourselves protected is the priority. Below are the top five antivirus programs for Mac (in alphabetical order):

Best Antivirus for Mac Computers

1. Agax Antivirus: Antivirus program by Agax is popular for its powerful and robust protection on a Mac computer. Apart from conventional features like detection and deletion of viral threats, it integrates your Mac OS with potent background protection which makes way for hassle free experience on computer.
Agax antivirus program features a shielding force namely, “Defender”. This adds to the overall protective features of this sound antivirus program. Agax antivirus program is also a free program.

2. ClamCour Antivirus: Since Internet is the primary source of most of the cyber attacks on your computer, ClamCour provides a robust protection while you are on Internet. This antivirus program mainly concentrates on the protection from cyber threats.
ClamCour offers an amazing feature called “Courier Filter” which scans all the mails coming into your inbox and does not allow you to download them, incase they are infected. It enhances your Internet browsing experience. Moreover, this antivirus program will not hurt your wallet as it a freeware.

3. iAntivirus for MAC: If you are a Mac user, then you would be aware of the name iAntivirus. It is one of the popular antivirus programs for Mac OS. And yes, this is also a free antivirus program. iAntivirus has been designed such that it does not allow malicious programs to attack your Mac OS.
Its real-time protection and solid detection system enhances all the security parameters of Mac OS for free. You can also keep updating this antivirus program to keep your computer safe from all the latest cyber threats.

4. McAfee Virus Scan: McAfee is not at all an unknown name for Windows users. And this popularity inspired them to design antivirus programs compatible on Mac OS. Like a typical McAfee computer security program, it allows you to keep your Mac OS free from old and new viruses, Trojans and other malicious programs.
This McAfee antivirus program for Mac features McAfee ePolicy Orchestrator which allows you to keep an eye on all the computers connected on the network. Its user friendly interface and availability of updates makes it a rough and tough antivirus program for Macintosh OS.

5. Norton Antivirus: Norton (Symantec) is a huge name in the arena of computer security experts. Even big companies trust their products capability. This undoubted fact makes it a popular and a favorite antivirus program for Macintosh operating system.
Its conventional detection and deletion feature with updated database makes it an ideal computer protection system. Regardless you are on Internet or not, its features will always make you feel safer from cyber threats like viruses, Trojans, and Rootkits.
Although Apple’s Mac OS provides some of the best security features like sandboxing, Library Randomization and Execute Disable, adding an extra layer of protection will never harm you. Choose your favorite antivirus program and get ready for a safer ride on Apple Macintosh OS.

Tuesday, November 24, 2009

iPhone worm steals online banking codes

The smartphones have become a big part of the digital world. We have the ability to do everything we would do at a computer terminal on our smartphones. The iPhone and blackberry are the two major players in the cellphone/internet world.

However, will all technology comes exploitation, and in the world of digital security in the 21st century iPhones have become victim.

I came across this article reporting on a worm stealing bank codes via the iPhone, iPhone users beware.

New iPhone worm steals online banking codes, builds botnet

'Duh' worm strikes only jailbroken iPhones, but ups the ante by snatching banking credentials

By Gregg Keizer Framingham | Tuesday, 24 November, 2009



Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online banking credentials, from jailbroken Apple smartphones.

A new worm, dubbed "Duh" by UK-based security firm Sophos, is related to the
"ikee" worm released earlier this month only in its approach, not in its code, said Chester Wisniewski, a senior security advisory with Sophos.

"It's different code, but the same conceptually," Wisniewski said today.

Both ikee and the new Duh worms take advantage of the default password used by the SSH (secure shell) Unix utility, which is installed by some users after they've "jailbroken" their iPhones. That term refers to the process of modifying an iPhone so its owner can download and install software outside Apple's official App Store channel. SSH lets users connect to their iPhone remotely over the Internet via an encrypted channel.

Duh changes the default SSH password of "alpine" to its own "ohshit" password, Wisniewski said.

Two weeks ago, noted iPhone and Mac vulnerability researcher Charlie Miller warned users that
jailbreaking their iPhone puts them at greater risk from attack.

The Duh worm uses the command-and-control strategy employed by traditional PC-based botnets to hijack data from the compromised device, then send it to a central server operated by the attackers, Wisniewski said. The server appears to be based in Lithuania, but the worm itself was probably crafted by Dutch hackers.

One task of Duh is to steal SMS-based authentication codes that some banks use to protect customers who are conducting financial transactions from their iPhones.

"Historically, hackers haven't been able to defeat the mTAN technology," said Wisniewski, talking about the mobile transaction authentication numbers that some banks send to customers as a second layer of authentication. When a user logs into a bank that supports mTAN, he or she receives a six-digit code that must be entered within the next 90 seconds to prove ownership of the account.

Last month, a variant of the Zbot Trojan watched for TANs on hijacked PCs, and used silent instant messaging to transmit the codes to waiting hackers, who then had a short window during which they could preempt the legitimate account owner to access funds. "Duh is using a similar concept," said Wisniewski. "It's looking for incoming SMS with mTANs, capturing those mTANs in real-time and sending them to the command-and-control server. That gives the criminals time to log on using the mTAN."

Although the Duh worm's resulting botnet may be among the first to target iPhones, Wisniewski downplayed the danger. "You're likely to know you've been hacked," he said, noting that Duh's constant network activity quickly depletes the iPhone's battery.

"And anyone playing by Apple's rules is, of course, safe," Wisniewski added. Since only jailbroken iPhones can be compromised by Duh, he recommended that users restore their devices to the most up-to-date Apple firmware by connecting it to their PC or Mac, then accessing iTunes.

But even though Duh strikes only a subset of iPhones, the worm and its botnet illustrates an often-overlooked fact, Wisniewski argued. "People don't realize that an iPhone is essentially an entire Unix-based computer in their pocket," he said.

"It's probably not practical to run spam bots on a phone, not with the battery drain, but data theft like this is a sign of what practical future worms will be like on the mobile platforms," Wisniewski concluded.

Thursday, November 19, 2009

BEWARE - 2010 is coming and brining many virus with it.

You read correctly, 2010 is bringing with it a slew of new viruses and malware.

I recently stumbled across this news article and thought to share it with my readers. For those of you who are intrigued, please feel free to check out the link and follow other news stories.

Some statistics:
currently 1 in 400 instant messages contain some form of hyperlink and
1 in 78 of those hyperlinks are associated with a malicious website. That
number is expected to increase to 1 in 12 as the adoption of instant messaging within trusted frameworks increases.

LINK


Attackers proved in 2009 that social networks could be used to spread malware and trick users into giving up their data, but in 2010, according to two senior Symantec researchers, cybercriminals will turn to more sophisticated methods, including using social network architectures for the backbone of their attacks.
SearchSecurity.com:
To get security news and tips delivered to your inbox, click here to sign up for our free newsletter.
In an effort to sustain growth and pick up new users, more social networks are opening up their architecture to allow third-party applications. Cybercriminals can take advantage of this by developing applications out of the social network environment to target users. In addition, access to social network APIs gives attackers a roadmap to vulnerabilities in legitimate third-party applications and a way to tap into user accounts.
"The bad guys can implant malicious code into the social network application and gain access to personal information and other data," said Paul Wood, senior analyst at MessageLabs Intelligence at Cupertino, Calif.-based Symantec Corp. "As the applications themselves become quite enticing and they may in turn be generated with some other purpose in mind … there may be less reputable motives behind some of these applications."
Wood and Zulfikar Ramzan, technical director of Symantec Security Response, presented their predictions for 2010 during a presentation this week. Many of the data security risks will be more of the same, the two researchers said. Drive-by downloads will continue to target people who fail to fully patch Web browsers and third-party plug-ins; rogue antivirus programs will continue to trick victims into buying software they don't need, and botnet operators will continue to control hordes of zombie machines to spread spam and harvest personal information.
2009 security threat predictions:
Future security threats: Enterprise attacks of 2009: Were organizations ready for this year's enterprise security threats? Expert John Strand predicted what was in store for 2009.

Encryption, DLP, disaster recovery topped 2009 priorities: Information Security magazine's annual Priorities 2009 survey identified data protection and disaster recovery among the top priorities for security managers. 
Ramzon said that while attackers will use much of the same tactics, they will learn to sharpen their methods to evade security technologies and enable cybercriminal gangs to pull in more money. Rogue security software, which was successful in 2009 with the spread of the Bredolab downloader could move into instances of computer hijacking, rendering them useless, he said.
Researchers have seen changes in malware in 2009 with cybercriminals producing multiple variants to trick antivirus signatures. While 2010 malware will be similar, targeted or specialized malware will aim at embedded devices, predicts Wood. Attackers will target ATM vulnerabilities, errors in electronic voting systems and even holes in systems that provide premium pay-per-view content to get access to streaming movies.
"It requires a significant degree of insider knowledge about the way these systems work and the ways they can be exploited," Wood said. "Seeing attacks against vulnerabilities in systems like computer-aided designed tools are not going to be mass marketed, but they're very useful for a targeted attack if you want to gain access to an organization."
Both researchers said instant messaging could represent a new way for attackers to spread malicious links. Many social networks are incorporating instant messaging features, and when combined with the high level of trust users have on social networks, they could create a lucrative environment for cybercriminals. Some attackers may combine URL shortening with spam techniques and instant messaging giving them a greater chance of success.
"There's a level of trust built up on these sites that if a user gets a message from someone on their buddy list, they're more likely to click on a link," Wood said.

Mac users are no longer immune
As in any business, cybercriminals need a large audience to generate enough successful attacks to make the effort worth it. Until now, Mac users have been relatively immune to the onslaught of attacks targeting operating system flaws. Apple users can become a victim of the company's success. As its marketshare increases in both Apple computer and smartphone sales, the opportunity for attack increases, Ramzon said.
"In 2009 we saw Macs and smartphones targeted more than in the past, and we expect that trend to continue," he said.
Smartphone popularity is also resulting in renewed interest from hackers, Ramzon said. The Sexy Space botnet was aimed at the Symbian mobile device operating system and the OSX.Iservice Trojan targeted Mac users in 2009. Malware authors will see more money making opportunities as a result of Apple's increased marketshare and the growth of smartphones in 2010, he said.
An interest in Mac users doesn't mean Windows users can breathe any easier. Windows 7 adoption is sure to increase next year and with that, hackers will be probing the new OS for vulnerabilities to give them a way in, Ramzon said.
SearchSecurity radio:
"We're dealing with large and fairly complex systems with literally many, many millions of lines of code, so to me it's not a matter of if the vulnerabilities crop up, it's a matter of when they are going to crop up," he said. "Microsoft's new operating system is no exception to this rule, and as Windows 7 hits the pavement and gains traction in 2010, attackers without a doubt are going to find a way to exploit the people who use it."
So far, Microsoft has had two known vulnerabilities in its latest OS. While many enterprises have gotten a handle on patching systems for OS vulnerabilities, third-party plug-ins in browsers and Internet-facing applications such as PDF readers and Flash players, have remained a pesky problem for IT security pros, he said.
"We will probably expect to see attackers look for vulnerabilities in both the applications that run on top of these platforms as well as the human psychological vulnerabilities of the person who operates the applications," Ramzon said.

Monday, November 2, 2009

AVG - FREE Anti-Virus Software


As the headlines put it `AVG Continues To Protect Consumers From Computer Security Threats`. I`m a big believer in online security which will protect you from any nasties that may find their way into your system and cause problems.

This is my first post in the list I promised to provide in security protection of the 21 century.

Your first line of defense should be your firewall, but these days that comes pre-installed on your computer.
The first real line of defense that you can get yourself is a good anti-virus program. There are many out there that require subscriptions on an annual basis and many that are free.

As a student I`m a big fan of the freebies and for me it`s been AVG for quite sometime. Not only do they give me active proteciton, scanning all downloads and emails, but will notify me and give me options as to what I would like to do with any potential threats.

Now I know almost all decent anti-virus software's do this, however, AVG is super easy to use and did I mention they have a free version?

If you want to get hooked up with AVG Anti-Virus Security protection for yourself click on the link below:
AVG Security Link

One final note, if you ever get some weird strange code associated with computer virus` just google the code, chances are you`re not the only one suffering.