Tag: malware

  • Malware’s third party path

    Malware’s third party path

    One of the few constants with computer security is that threats are constantly evolving.

    Malware – malicious software like computer viruses, worms or Trojan horses – are the most common security threat the ordinary technology home or business users will encounter on their PC, laptop or smartphone.

    During the big computer virus epidemic of the early 2000s the main target were Windows 98 or XP machine running Internet Explorer as these were so easy to infect.

    Today, it’s harder to infect Windows systems and the malware writers have become more sophisticated in the tools and methods they use to catch victims.

    Right now, we’re seeing the malware writers focusing on  weaknesses in third party software such as Java, Flash and Microsoft Office.

    Mac users have been affected by the Flashback worm which used flaws in the Java computer program and now Adobe have released an emergency update to their Flash application to fill a security hole that could affect all operating systems.

    Along with being more sophisticated in their methods, today’s malware writers are also more organised with real criminal objectives as opposed to the earlier generations that were derided as “script kiddies”.

    So there’s real risks in not taking basic steps to protect your computer system.

    Have the latest updates

    When your system asks you if you want to install updates, do so. Both Macs and PCs have an automatic update function which you should enable and pay attention to.

    Individual software packages like Java, Flash and Microsoft Office have their own update reminders which you should also pay attention to.

    Sometimes though the malware writers distribute fake updates to fool people into installing their software so if you are suspicious about an update, check online to see if you have the latest version.

    Run computers in Restricted User mode

    One of the big weaknesses for all systems is there is a tendency to run as an Administrator. In older Windows systems this gives almost complete control over the system and can still create problems in newer systems as well as with Mac or Linux systems.

    Every user should be run as a Restricted User and this can be set up in the Windows Control Panel or Mac Preferences.

    Have an antivirus

    While the antivirus industry loves flogging overpriced and overfeatured software that generally slows your computer down as much as it protects the system, it’s still worthwhile having.

    For Windows users, the free Microsoft Security Essentials is fine for most users. For Mac users, the free ClamAV or Sophos Anti-Virus for Mac are good choices.

    Use a third party browser

    Generally using the built in web browsers – Internet Explorer in Windows and Safari on the Mac – tends to amplify security risks. So use a third party browser like Firefox, Google Chrome or Opera.

    Be careful

    Malware writers, like all crooks and conmen, try to exploit human weaknesses so their tricks often appeal to our greed, fear or lust.

    Try to avoid websites offering pirated software, movies, music or pornography and never click on emails or pop up adverts that claim you’ve won the lottery or been infected with a virus.

    Cybercrime is real and growing although we should keep in the threat in perspective and not fall for the hysterical headlines we often see in the media.

    The risks are going to continue to evolve as the crooks move onto trying to exploit weaknesses in smartphones, social media platforms and cloud computing services.

    Despite this, most people won’t be affected by malware or other computer crime by being careful. Just don’t count on being lucky.

    Similar posts:

  • Ending the era of Mac complacency

    Ending the era of Mac complacency

    The news that the Flashback Trojan has infected an estimated 600,000 Apple Mac computers has been greeted with joy by the dozens of industry experts that have predicted a virus holocaust for smug Mac users for nearly a decade.

    While the Flashback malware – the earlier versions could be described as a computer Trojan Horse while the later editions are more like a computer worm – is a real risk to Mac users and it’s important to take this risk seriously.

    The Netsmarts business site looks at how Mac and Windows users can protect themselves from Flashback and its variants.

    One of the key things in the advice is to make sure anybody using the computer has limited rights; as a Managed User on the Mac and as a Limited User in Windows. This dramatically reduces the opportunity for bad things to happen while online.

    I’ve discussed previously while user privileges are one of the reasons why the Mac has historically been less prone to infection to virus infections than their Windows cousins.

    Microsoft made the decision in the 1990s not to tighten Windows’ security settings and their customers paid the price for the next decade. This was compounded by some poor implementations of various technologies in Microsoft Windows.

    This isn’t to say the Mac, or any other computer system, doesn’t have security bugs. Every operating system does and it’s a conceit of everybody immersed in new technologies, be it cloud computing back to horse drawn chariots, to believe their products are magically infallible.

    Part of the crowing from the security experts and charlatans who’ve been desperately predicting a “Macapocalypse” for nearly a decade overlook this.

    Even with the proven problem of the Flashback virus, its unlikely we’re see the deluge of malware like that of the early 2000s simply because the Mac OSX, Windows 7 and all the other mobile and computer operating systems don’t have the structural flaws that Windows 98, ME and early versions of XP had.

    Much of the Mac versus PC argument in security is irrelevant anyway; the main game for scammers and malware writers has moved to social media services like Facebook and this is where computer users need to be very careful.

    However the stereotype of the “Smug Mac” user was true, one caller to my radio show claimed he didn’t have a problem with spam because he had a Mac. Nothing could convince him that email spam wasn’t related to the type of computer you used.

    To be fair to Apple they never made the claim their computers were invulnerable to malware, apart from the odd dig at Microsoft. Their users did it for them.

    That type of smug Mac user are those who do need a wake up call. For the industry though, it’s business as usual although some will be feeling a little smug their hysterical predictions of the last decade came true in a small way last week.

    Similar posts:

  • 702 Sydney Weekend computers: April 2012

    702 Sydney Weekend computers: April 2012

    On ABC 702 Sydney Weekend computers this Sunday, April 8 from 10.15am Paul Wallbank and Simon Marnie will be looking at the end of innocence for Apple Mac users, the DNS Changer Virus and how political campaigning is coming to a Facebook site near you.

    Some of the topics we’ll discuss include;

    If you’d like to learn how to protect your Mac or Windows computers from malware, visit our Netsmarts article on the Flashback virus that explains the security settings and suggests some free anti-viruses.

    Listeners’ Questions

    While we had a great range of calls from listeners, there was only one we promised to get back to. Kay clearly has a virus infection on her Windows computers and we recommend the free MalwareBytes program to clean it up.

    Our IT Queries site has more instructions on cleaning up a virus infection if you’re worried about a sick computer.

    We love to hear from listeners so feel free call in with your questions or comments on 1300 222 702 or text on 19922702.

    If you’re on Twitter you can tweet 702 Sydney on @702sydney and Paul at @paulwallbank.

    Should you not be in the Sydney area, you can stream the broadcast through the 702 Sydney website and call in anyway.

    Similar posts:

  • The business of denial

    The business of denial

    Denial is a powerful sedative, it allows us to trundle dozily along a well worn patch oblivious to the reality our comfortable world has changed.

    Last week’s claim that youth is fed up with the iPhone by Nokia’s Niels Munksgaard – who has the wonderful title of Director of Portfolio, Product Marketing & Sales – is a great example of how far and how long denial can continue while there’s still money to pay executive bonuses.

    Canada’s beleaguered Research In Motion, manufacturers of the Blackberry phone, showed the same delusions when they released their Playbook tablet computer with the declaration Amateur Hour Is Over.

    The only amateur hour was in the hubristic minds of RIM’s marketing team.

    While profits keep flowing big organisation can afford delusions – Google can indulge their social media fantasies while the Adwords rivers of gold continue to flow ever faster and Microsoft can continue to indulge their delusions while their Windows and Office products remain immensely profitable.

    Microsoft’s “droidrage” campaign, designed to embarrass Google’s Android mobile phone platform, is part of that delusion; for Microsoft’s campaign to work they have to prove there is a widespread Android malware problem, show their system isn’t prone to the same flaws and – most importantly – have enough product on the market to sell to those disillusioned Google customers.

    Such a negative campaign has many fallacies – it assumes there are widespread security problems in Android, that Microsoft will pick up disaffected Google customers and there are enough Microsoft based products to grab those sales.

    Probably Microsoft’s biggest problem is the assumption that customers actually care about that stuff – for years Windows dominated its market despite being riddled with computer with security holes and malware.

    Microsoft succeeded because their competition was delusional; the best example being WordPerfect claiming graphic systems like Windows were a fad at a time when an inferior Microsoft Word was gobbling up their markets.

    By the time WordPerfect realised their error and released a truly dreadful WordPerfect for Windows it was all too late, like a stagecoach company realising the motorcar is here to stay.

    The problem for businesses in denial is that reality eventually does bite; plenty of people in the newspaper industry believed their advertising based model was secure and profitable – indeed many of the cosseted managers in that sector still believe it is – which now leaves them struggling in a changed world they thought they could ignore.

    Denial among incumbents is a great opportunity for newer, more flexible players; for years mobile phone and tablet computer manufacturers were in denial about the usuability of their product – Apple proved them wrong and now commands the most profitable chunks of those markets.

    Being the village blacksmith or a buggy whip maker was a good business to be in at the beginning of the 20th Century. Thirty years later those block boys and saddlemakers who hadn’t made the jump found themselves out of work.

    It’s going to be interesting to see will be this century’s buggy whip manufacturers.

    Similar posts:

  • Securing the USB stick

    Securing the USB stick

    While I’m always reluctant to publicise security company’s media releases – believing many of them to be hysterical hype – a quick study by Sophos on lost USB keys has some interesting lessons for all of us who use thumb drives to carry data.

    Sophos bought 50 USB drives at Sydney’s CityRail unclaimed lost property auction and analysed them for malware and security risks.

    The study – not yet online – found more than 4,400 files including photos, CVs and job applications. Confidential material that could be used for identity theft, stalking or commercial advantage.

    Encryption

    If you are moving confidential data between computers, it may be a good idea to consider encryption software that protects files from unwanted visitors. Mac OS X has encryption software built in as does  all but the home versions of Windows 7 and Vista.

    Should you have a computer that doesn’t come with encryption, or you’re taking the drive between different venues, then you may need a third party encryption program like TrueCrypt. Note you’ll need administrator rights to install the software on every machine you use.

    The Malware threat

    As a security company Sophos leaned heavily towards the malware aspect with a headline that 66%, or 33, of the drives had some sort of malware on them.

    While that statistic is suspiciously high, it does illustrate the risk of plugging USB sticks into school, office and internet cafe computers. Like unsafe sex, the likelihood of catching something nasty increases with the more partners you have.

    Perversely Apple Macs could be helping spread the malware as Mac users generally don’t use or need anti virus sofware and any viruses picked up on someone else’s Windows system can sit undetected and dormant until they are used on another PC.

    Consequently, its good practice to wipe a drive when you’re finished with it so along with deleting malware you are also not keeping unnecessary and possibly out of date files on your drive.

    Overall, Sopho’s survey illustrates why cloud services like Dropbox and Box.net are best for sharing data although the USB stick still has an important role when everything else goes wrong.

    Similar posts: