IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

The Price for Downloading Cracked Software

21 June 2011 By Saran

Whether you are downloading a trialware or files from Bittorrent, the chances of cracking or using the full version has severely dwindled in the past months. For one, other than possibly downloading infected software with Trojans and malware, unlocking these supposed protection software has taken a bad hit by the advanced efforts of private software companies to crack down on piracy.

Take for example Kaspersky Internet Security 2009 which has cracked the whip on licenses by blocking them once you start updating the software. While you can install and crack them, they are rendered useless in the end since once you hit that update option, your key is automatically blocked. Worst, malware and Trojans start coming in (a scenario which I don’t understand if it was made on purpose by the vendor in sending malware) infecting the systems folder where Windows is installed.

Before you know it, dozens of files in the form of dll’s start showing and mind you, they are dangerous. So if that was the case, it makes you think if you were better off not using an anti-virus software at all.

But such is the price to pay for trying to pull a fast one. Everyone loves free things and free software is surely to be an eye-catcher. But if the return is tons of viruses and malicious programs that can wreck your computer, you better think twice before downloading them again.

Filed Under: Operating Systems, Spyware Tagged With: cracked, kasperksy, Malware, software, trojans, viruses

Cyber Wars: A Lost Cause

7 June 2011 By Saran

We know for a fact that the battle towards malicious software and viruses released on the web has caused a lot of pain as far as pinpointing and remedying them but apparently nothing has been done to really resolve them. We buy licensed software but we have to ask ourselves on the extent of their coverage. Are they up to date and can they really save us from all these uncertainties of getting online?

Microsoft has been a prime target, being one of the widely used operating systems we know of today. But while Bill Gates and company are doing their part in being able to address the various intrusions and headaches that they can do with a simple click, you just don’t know who to trust these days. Even the software companies have the ability to manipulate and do some foul work and they are occurring right under our very noses.

Security researchers concede that their efforts are largely an exercise in a game of whack-a-mole because botnets that distribute malware like worms, the programs that can move from computer to computer, are still relatively invisible to commercial antivirus software.

So with all these things set on the table, is the cyber world safe for anyone? We can fend off threats but the question is are we resolving the situation or merely providing a temporary solution to the problem? Sad to say, it is the latter. We are content with detecting them but it is really the cleaning and protection part that needs improvement.

Filed Under: IT Security Basics, Malware, Security Policies, Spyware Tagged With: cyber wars, internet, Malware, trojans

Malware is Always a Click Away

18 November 2010 By Saran

One click is all it takes to be infected and for the avid PC user, it would be wise to make sure that you look before you click. Malware issues can come in different forms like:

1. Emails
2. Popups
3. Links via Instant Messaging

In fact, even if you know the person who sent you the link, you cannot entirely rely on your relationship and trust with them as the main reason for clicking on the link. This was done before but today, people have to be aware that there are some accounts that can be easily hacked or even impersonated.

Much of these issues have plagued us through the years. Some have had their share of problems dealing with Malware and Trojans. They are different from viruses but sometimes, they can do more harm compared to the traditional viruses.

Even having anti-virus or anti-spyware protection is not guarantee from being contaminated with them. Remember, a click is all that it takes and all hell will break loose. For most, it is easy to remedy since they can reformat their computer. But think about the files you may lose from the moment you click on these links.

It may be hard to save these files since chances are they have already been infected. With that said, your files and PC are practically good as dead. So the moral of the lesson is, don’t be trigger happy with clicking. You are just raisin the stakes of being infected by doing so.

Filed Under: Malware, Spyware Tagged With: Malware, security, Spyware, trojans

How To Catch a Worm in a Network

11 November 2010 By Saran

Worms and Trojans can make their way into local intranets fast if you don’t have a good firewall to protect your networking environment. Most of it originates from overlooked files like granting access to the Internet for specified users. But rest assured, unless you document and orient these people on potential risks, chances are the ones to whom you grant access will be the bane of your network security issues.

A worm can multiply fast if not contained immediately. For one, it can affect the whole network. So how do you go about it?

1. Unplug all the computers from the network. Cable disconnection would be a good start. If they are not connected, then there is no place for them to go. Depending on the number of workstations, you may have your work cut out for you. But at least it defeats the need to come and go from one workstation to the other once one is cleaned.
2. Scan the computers manually using a CD. As much as possible use a write-once optical disc. This way, if you find the worm or virus, you have it cornered. There is no place to hide nor go for them.
3. Restart and make a second check. Make sure everything is clean for one workstation. Do this for the rest of the computers that have been potentially affected.

This process requires a lot of patience. But it beats having to turn to the usual formatting and clean everything from scratch. It is indeed demoralizing, but the thing is, you just have to deal with it since better security policies need to be enforced on your end as far as users are concerned.

Filed Under: Malware, Network Security Tagged With: Malware, networkin, trojans, worms

Putting Up Fences from Internet Spyware and Trojans

27 July 2010 By Saran

Harmful objects can be obtained from the web. We are all aware that Malware and Trojans are rampant objects that have been wandering of anywhere on the Internet, especially websites that are often visited by people for reference and information. Such sites would get hijacked and also contaminate visiting users as well, something that can be done through Internet cookies stored on the web folder in the machines.

Picket Fences on the Web

While developers and security administrators have religiously searched for ways to find such solutions, the ever changing development of new threats coming from the Internet has been far from over. To date, even the well-protected workstations can still be penetrated by objects that are not immediately visible.

Internet fences in the form of firewalls and software protection templates have tried to stop such intrusions but need to be updated frequently to answer the related threats. Without such temporary fences that are up, workstations are sitting ducks waiting to be shot, and if web administrators are not up to date with the new threats, the fences used are good as gone once they occur.

Filed Under: IT Security Basics, Malware, Network Security, Physical Security, Security Policies, Spyware Tagged With: firewall, Malware, Spyware, trojans

Careful of Unknown Links in Messaging

6 July 2010 By Saran

Trojans hacks and worms can easily enter a person’s computer by a mere click of a link. Instant messaging, the new trend in adhering towards faster and easier communication anywhere in the world has been enhanced thoroughly, going to the extent of allowing links to be followed, sometimes generated automatically from infected computers. Such are done even when offline messages are left, such as in Yahoo Messenger issues.

Instant Messages

The best way to avoid such links is to refrain from clicking on links without prior notice from the actual user. While most people would rely heavily on the level of relationship that they would have with their online buddy, it is still best to double check and verify before proceeding on the site link.

Being infected is quite painful that it leads to even formatting the entire system. This holds true for people who are not aware or have the time to clean it manually and methodically. Hence, the best way is to be more cautious, especially when peculiar links are met.

Filed Under: IM, Instant Messaging, IT Security Basics, Malware, Spyware, Wireless Security Tagged With: hijack, Instant Messaging, trojans, worms, yahoo-messenger

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security