Industry and trend analysts say the propagators’ efforts will not let up. Last year marked the first mobile phone virus, and Bluetooth technology, for example, exacerbates security threats. 35% of PCs in the US are infected, while in China and India rates reach 50%.

Experts in the field of security report that the first virus spread as far back as 1981. However, Fred Cohen wrote in his seminal article that the first virus was conceived as an experiment on November 3, 1983. Since then, viruses and malware have plagued and wreaked havoc on computer systems around the world.

Internet risks

With the advent of advances in communications such as the Internet, mobile telephony, and Bluetooth (a short-range radio technology that simplifies wireless communication between devices such as computers and mobile phones, it also aims to connect these devices to the Internet quickly and easily ), computer viruses have spread at an alarming rate. The downside of such advances is that where previously only a few computers were infected, now thousands, if not millions, are at the mercy of virus writers.

The first threats disable 10% of infected computers

In 1987, a large network (ARPANET) used by universities and the US government was infected by a virus. Robert Morris, son of a National Security Agency computer security expert, sent malicious code over the ARPANET, affecting around 10% of connected computer hosts; at that time, there were only 60,000 hosts connected to the network. The code was reproduced and leaked through the computers on the network; consequently, the size of the files filled the memories of the computers, thus disabling numerous machines.

An alarming 66% of PCs today are infected by spyware and 35% are infected by viruses in the US Today approximately 1.21 billion people (Computer Industry Almanac) are connected to the Internet with millions of hosts computers connected to chat, exchange files, send emails and communicate in general. Can you imagine how easy it is to spread a virus or malware?

An anti-spyware developer reports that the malicious spyware infection rate in businesses is approximately 7% and adware appears on a whopping 52% of machines. 3-5% of enterprise machines had keyloggers. In homes, the percentages are much higher. The same anti-spyware developer reports that 66% of PCs scanned by its online tool were infected with an average of 25 spyware entities each. If one were to define cookies as spyware, the rate would skyrocket to 88%! Adware was found on 64% of the machines. Viruses and Trojans, the company reports, were found on 7% and 19% of the machines, respectively.

According to Panda Software, more than 50% of PCs in India and China, for example, are infected with a virus. In the US and UK, the rate is 35%. Yet this means that many people are still without active protection today.

Antivirus is not enough

In a study by security company Checkbridge, the company ran 2 million email messages through three popular email scanners. None of the programs tested caught all the viruses. The success rates of the scans ranged from 97% to 64%. The Checkbridge CEO also says that in many cases, using two scanners at the same time does not guarantee detection of all viruses at all times. Similarly, many computer experts report that using two or three anti-spyware programs generally removes 95% or more of spyware.

Security Pillars

How can you protect your system and data in the midst of so many security threats from so many different sources?

Just think, malware (malicious code) has been around for almost 25 years. Every year millions of people and businesses lose substantial sums of money in terms of lost and often unrecoverable data. To top it off, some viruses hog system resources and Internet connections making it impossible to work or play. And this does not include frustration and anger at not being able to identify the source of the problem.

One of the first steps in protecting your PC is to make sure the operating system (OS) is up to date. This is critical as operating system manufacturers, such as Microsoft Windows, continually update the security features of their products to fill any potential and actual gaps.

Second, you must have up-to-date antivirus software running on your system. Make sure you pick one of the best on the market today – a few bucks won’t break you, but a virus will. Make sure your antivirus software is updated frequently (sometimes even daily if necessary) with fixes to the actual engine and database files that contain the latest cures against new viruses, worms, and Trojans. Antivirus software should have the ability to scan emails and files as they are downloaded from the Internet to help prevent malware from reaching your system.

Many users use a third component for the security of their home and/or computer system: firewall software. A good system prevents unauthorized use and access to your computer from outside sources (for example, hackers or hijackers), as well as giving you additional protection against the most common Trojans and worms. A firewall alone will not eliminate the virus problem, but when used in conjunction with updates to your operating system, antivirus software, and information from processlibrary.com, it will provide you with increased security and system protection.

A fourth component of security is manual intervention. This option can be daunting for any beginner, however, such an intervention will definitely help you combat bland Trojans that may not be removed by your standard antivirus and spyware products.

I’d like to explain two tools that can be used to intervene when all else fails: the native Windows Task Manager to help you list all the processes running on your PC, and a nice online library that explains what these processes are for and if they are legitimate Or not. Of course, you need to use these tools carefully. Press CTRL+ALT+DEL to call Windows Task Manager to help you identify most processes running on your computer; this is a built-in functionality of the Windows operating system. Review the processes one by one, and then look up the process names in one of the many available process libraries. I use processlibrary.com, but there are many others, including neuber.com, file.net, and bleepingcomputer.com. In any case, these libraries are directories of information (typically free) with search functionality.

With this information, you can immediately identify any potential new threats that may have infiltrated your system. The definitions will help you cover that period of time until your preferred antivirus and antispyware software vendors update their scanners. When you identify it, simply look up the process within the processlibrary.com database and you’ll have an exact definition and tips on what to do.

Fight against spyware, adware and other forms of malware

In some cases, it is not so easy to realize that spyware and related forms of malware are installed on your system.

In other cases, you’ll almost immediately notice changes to your web browser that you didn’t make. These changes include toolbars you didn’t want to install, different home page settings, or changes to your security settings and favorites list.

Other signs of spyware include pop-up ads that are not related to the website you are currently viewing. Many of these ads are usually related to pornography or emoticons or performance/security enhancers and are not displayed as legitimate ads normally do. Ads may also appear when you are not browsing the web. Spyware is not only annoying, it slows down your system performance, increases startup time, hogs your Internet connection, and sometimes causes system crashes.

You must install an anti-spyware software package. There are some good ones on the market and many experts even suggest installing two or three, as a single package may not be powerful enough to find all the entries and changes to your registry and other files made by spyware. Such malware installs like any other application on your system, thus leaving traces of itself in registry files and other places on your system. Anti-spyware works by searching for these traces and removing them.

Also be careful with what you download from the Internet. Make sure you know the sources you download stuff from, and even here you have to pay close attention. For example, not all companies that claim their software contains adware actually only offer adware. There is always the possibility that there is spyware disguised in the program. Be sure to read the privacy policies and license agreements. Also, firewalls should be of great help in the fight against spyware and malware.

New forms of security threats

Malware writers and hackers are always looking for new ways to disrupt the normal operation of your system and, even worse, steal your private data. Cross-site request forgery (CSRF) is a form of attack on a website, also known as session driving. According to leading security experts (eg Jeremiah Grossman), this form of attack is rare, but it is a “sleeping giant.”

Here is an excerpt explaining what CSRF is taken from an excellent CSRF FAQ: “Cross-site request forgery (also known as XSRF, CSRF, and cross-site reference forgery) works by exploiting the trust that a site has for the user. Site tasks are usually linked to specific URLs (Example: [http://site/stocks?buy=100&stock=ebay]) that allows specific actions to be performed when requested. If a user is logged in to the site and an attacker tricks their browser into making a request to one of these task URLs, then the task is performed and logged in as the logged in user. Typically, an attacker will embed malicious HTML or JavaScript code in an email or website to request a specific ‘task url’ that is executed without the users knowledge, either directly or by using a scripting flaw between sites. Injection via lightweight markup languages ​​like BBCode is also entirely possible. These types of attacks are quite difficult to detect and potentially leave a user debating with the website/company whether the shares purchased the day before were initiated by the user after the price crashed.” Click here to read all the frequently asked questions

So what is the solution? The solution is to try to work hard to minimize security threats by using the right tools and by requiring that the websites you use regularly take a similar approach.

Leave a Reply

Your email address will not be published. Required fields are marked *