IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

The Price for Downloading Cracked Software

21 June 2011 By Saran

Whether you are downloading a trialware or files from Bittorrent, the chances of cracking or using the full version has severely dwindled in the past months. For one, other than possibly downloading infected software with Trojans and malware, unlocking these supposed protection software has taken a bad hit by the advanced efforts of private software companies to crack down on piracy.

Take for example Kaspersky Internet Security 2009 which has cracked the whip on licenses by blocking them once you start updating the software. While you can install and crack them, they are rendered useless in the end since once you hit that update option, your key is automatically blocked. Worst, malware and Trojans start coming in (a scenario which I don’t understand if it was made on purpose by the vendor in sending malware) infecting the systems folder where Windows is installed.

Before you know it, dozens of files in the form of dll’s start showing and mind you, they are dangerous. So if that was the case, it makes you think if you were better off not using an anti-virus software at all.

But such is the price to pay for trying to pull a fast one. Everyone loves free things and free software is surely to be an eye-catcher. But if the return is tons of viruses and malicious programs that can wreck your computer, you better think twice before downloading them again.

Filed Under: Operating Systems, Spyware Tagged With: cracked, kasperksy, Malware, software, trojans, viruses

Cyber Wars: A Lost Cause

7 June 2011 By Saran

We know for a fact that the battle towards malicious software and viruses released on the web has caused a lot of pain as far as pinpointing and remedying them but apparently nothing has been done to really resolve them. We buy licensed software but we have to ask ourselves on the extent of their coverage. Are they up to date and can they really save us from all these uncertainties of getting online?

Microsoft has been a prime target, being one of the widely used operating systems we know of today. But while Bill Gates and company are doing their part in being able to address the various intrusions and headaches that they can do with a simple click, you just don’t know who to trust these days. Even the software companies have the ability to manipulate and do some foul work and they are occurring right under our very noses.

Security researchers concede that their efforts are largely an exercise in a game of whack-a-mole because botnets that distribute malware like worms, the programs that can move from computer to computer, are still relatively invisible to commercial antivirus software.

So with all these things set on the table, is the cyber world safe for anyone? We can fend off threats but the question is are we resolving the situation or merely providing a temporary solution to the problem? Sad to say, it is the latter. We are content with detecting them but it is really the cleaning and protection part that needs improvement.

Filed Under: IT Security Basics, Malware, Security Policies, Spyware Tagged With: cyber wars, internet, Malware, trojans

Be Wary of Giving out Your Email Address

25 May 2011 By Saran

Emails are supposed to make life easier but sometimes, it may be wise to choose who you give out your email to. Today, a lot of mischief can be done and normally this comes in forms of email attacks or email bombs. In such scenarios, don’t be surprised if you find your email downloading hundred to a thousand emails in one sitting. That is not the best part. You would be lucky if this was done only once since others would schedule it daily.

Why do they do it? One is for trials of these foolish software and the other can perhaps be for malicious reason. It is a fact that while many people on the web cannot be harmed physically, they can create headaches for you in the form of discomforts from the privileges you get from the web. One of the main elements an online user would need to use is his email and by doing these email attacks, it burdens the person on how to get important information usually sent through the web.

One cannot avoid such instances. But the best way to prevent it is to choose the people you give it too. For people you meet on the web, it would be wise to use free mail accounts from Gmail or Yahoo over your personal one. Avoid the troubles of such since it will not only be a discomfort, but a forgettable experience as well.

Filed Under: IT Security Basics, Malware, Security Policies, Spyware, Tips Tagged With: emal, explosion, security, spam

Assigning Limited Email Space and Security

30 November 2010 By Saran

A lot of the viruses and Trojans today find their way into a network or a computer using emails. They come in the form of links or attachments which are always a risk for anyone especially if they don’t have the proper software to screen these files being sent via email. One good way to go about it is to set limits as far as the main email configuration server is concerned. While it may not be able to screen links in emails, attachments of any sort can be minimized.

A good way to provide manual preventive measures is through memorandums and of course lectures that IT personnel can provide to the people in an organization. Newsletters are another option, warning people of virus alerts and how they can make their way into computers.

Spreading in networks starts from one computer. These are a given. So if network and security administrators want to avoid having to address such issues, it would be best to start by safeguarding workstations and orienting people of the threat of such.

Of course, not all people will be listening to you. As far as they are concerned, it is the duty of IT personnel to block them off even before they reach the individual mailboxes. Petty as it may seem, it would be best to use all precautions necessary. While many people will not cooperate, there are measures a good IT person can do and it all starts with research and beefing up security measures through software and policy declarations.

Filed Under: IT Security Basics, Network Security, Spyware Tagged With: email security, space

Malware is Always a Click Away

18 November 2010 By Saran

One click is all it takes to be infected and for the avid PC user, it would be wise to make sure that you look before you click. Malware issues can come in different forms like:

1. Emails
2. Popups
3. Links via Instant Messaging

In fact, even if you know the person who sent you the link, you cannot entirely rely on your relationship and trust with them as the main reason for clicking on the link. This was done before but today, people have to be aware that there are some accounts that can be easily hacked or even impersonated.

Much of these issues have plagued us through the years. Some have had their share of problems dealing with Malware and Trojans. They are different from viruses but sometimes, they can do more harm compared to the traditional viruses.

Even having anti-virus or anti-spyware protection is not guarantee from being contaminated with them. Remember, a click is all that it takes and all hell will break loose. For most, it is easy to remedy since they can reformat their computer. But think about the files you may lose from the moment you click on these links.

It may be hard to save these files since chances are they have already been infected. With that said, your files and PC are practically good as dead. So the moral of the lesson is, don’t be trigger happy with clicking. You are just raisin the stakes of being infected by doing so.

Filed Under: Malware, Spyware Tagged With: Malware, security, Spyware, trojans

Putting Up Fences from Internet Spyware and Trojans

27 July 2010 By Saran

Harmful objects can be obtained from the web. We are all aware that Malware and Trojans are rampant objects that have been wandering of anywhere on the Internet, especially websites that are often visited by people for reference and information. Such sites would get hijacked and also contaminate visiting users as well, something that can be done through Internet cookies stored on the web folder in the machines.

Picket Fences on the Web

While developers and security administrators have religiously searched for ways to find such solutions, the ever changing development of new threats coming from the Internet has been far from over. To date, even the well-protected workstations can still be penetrated by objects that are not immediately visible.

Internet fences in the form of firewalls and software protection templates have tried to stop such intrusions but need to be updated frequently to answer the related threats. Without such temporary fences that are up, workstations are sitting ducks waiting to be shot, and if web administrators are not up to date with the new threats, the fences used are good as gone once they occur.

Filed Under: IT Security Basics, Malware, Network Security, Physical Security, Security Policies, Spyware Tagged With: firewall, Malware, Spyware, trojans

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security