IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

The Price for Downloading Cracked Software

21 June 2011 By Saran

Whether you are downloading a trialware or files from Bittorrent, the chances of cracking or using the full version has severely dwindled in the past months. For one, other than possibly downloading infected software with Trojans and malware, unlocking these supposed protection software has taken a bad hit by the advanced efforts of private software companies to crack down on piracy.

Take for example Kaspersky Internet Security 2009 which has cracked the whip on licenses by blocking them once you start updating the software. While you can install and crack them, they are rendered useless in the end since once you hit that update option, your key is automatically blocked. Worst, malware and Trojans start coming in (a scenario which I don’t understand if it was made on purpose by the vendor in sending malware) infecting the systems folder where Windows is installed.

Before you know it, dozens of files in the form of dll’s start showing and mind you, they are dangerous. So if that was the case, it makes you think if you were better off not using an anti-virus software at all.

But such is the price to pay for trying to pull a fast one. Everyone loves free things and free software is surely to be an eye-catcher. But if the return is tons of viruses and malicious programs that can wreck your computer, you better think twice before downloading them again.

Filed Under: Operating Systems, Spyware Tagged With: cracked, kasperksy, Malware, software, trojans, viruses

Patch Up or Lose your Information

20 April 2011 By Saran

You just have to look at how Microsoft always announces certain patch releases for their software these days. Nothing is definite and safe just yet especially if you consider hackers and computer geeks trying to discover flaws in certain computer software such as an operating system. There will always be something discovered and the loophole can be entirely critical and dangerous.

Unlike in the latter 1990’s, today we rarely see patches being given since they have more or less covered the security threats ranging from viruses to malware today. There are still recommended patched needed. But surely, they are not as rampant and dangerous compare to before. And to make sure that you are using authentic software, they make use of software authenticity codes to know if you are using genuine software or not.

Microsoft can be commended for this but it still remains that there are still a lot of flaws as far as their software releases are concerned. But to make sure that customers do not experience these unfortunate mishaps, a continuous research and development for such threats has to be implemented. We can see these days that something will suddenly break out and if you are not protected, chances are you are missing a patch.

As much as possible, apply these patches. If you are in doubt, read on them or even ask for technical support. Security breaches in the IT world are common and to stay away from such a discomfort, it is best to be updated and make sure you are well-protected.

Filed Under: IT Security Basics, Malware, Operating Systems Tagged With: Malware, Microsoft, patches, security, viruses

Precautions with Bluetooth Connections

13 July 2010 By Saran

Among the features that most mobile phones have today is that of features that include the Bluetooth and Infrared connectivity as a means of wireless connections. While such advancements has made it easier for people to transfer files such as images and sounds from one phone to another, it also becomes a loophole to allow viruses to infect the operating system of mobile phones today.

Cabir Bluetooth Precaution

Worms such as Cabir, have become the onslaught of rampant mobile phone intrusions, something that uses the Bluetooth connectivity as a means of infecting mobile phones of today. Once they get through, malfunctions and error messages are sure to ensue, making it a need for the software systems of mobile phones of today to be either formatted or disinfected with available anti-virus and worm removers such as Panda Software.

Inconvenient as it may seem, it is advisable for mobile phone owners to refrain from activating their Bluetooth connections to avoid such infections and untoward intrusions at any time.

Filed Under: IT Security Basics, Malware, Operating Systems, Real-World Issues, Spyware, Tips, Wireless Security Tagged With: bluetooth, cabir, connectivity, viruses, worms

Viruses Preying on Removable Storage Devices

29 October 2008 By Saran

The growth in the use of removable storage devices has been evident in the past years and while they mainly just carry files made up of audio, video or simple documents and worksheets, they are vulnerable to virus attacks. How do they get them? Well for one, you never know if the original location of the file you were working on was virus free. This is assuming that you are transporting the file from one PC to another.

Also, you can never be too sure that once you plug on the usual USB drive from one computer to another, viruses may sneak past you. They may be equipped with anti-virus software but somehow you have to be amazed at how they breach the computer guards and make their way on USB drives.

So what is a person to do? Well for one, stick to the old practice of scanning a removable storage device first before you open any file on it. It may take a long time to finish, especially if the device is large in terms of capacity but nothing beats waiting than making sure you are protected.

Further, people fascinated with these miniature storage devices could care less if their files are infected. Sometimes it is not the file but the operating system that these storage devices contain. But make sure about it that while they have operating systems of their own, they do not have virus protection. Just be cautious, since that is the best you can do for now.

Source

Filed Under: Malware, Operating Systems, Spyware, Storage Tagged With: storage device, usb, viruses

Do Not Be Annoyed by Pop Up Warnings by your Software

27 October 2008 By Saran

For some people, seeing sudden pop-ups serving as warnings by protection software can be irritating. While it only shows that you were warned of a potential threat, some people do not really care that much as long as nothing goes wrong. There are some software options that allow you to turn it off. But for the sake of knowing what type of potential threat you may have had, it would be best to keep it on for a better understanding of what you are dealing with.

Most programs like BitDefender do this. Programs that combine anti-virus and anti-spyware protection can be sophisticated at times but the main issue here is that they are protecting you and not annoying you. So if you get a message telling you that they have blocked a potential threat to your computer is concerned, read it and then just discard it. It is the best way to understand what harmful objects are set out on the web today.

But once they are detected, what is a PC user supposed to do? In these cases it would be best to delete all the temporary files on your IE folder so that no trace of these harmful Trojans will remain.

Do not think that just because they were blocked, that is the end of it. They are still residing in your computer. So to ensure they are completely gone, delete all the temporary files at your control Panel by clicking on Internet options and deleting all cookies, temporary files and browsing histories.

Filed Under: IT Security Basics, Network Security, Operating Systems, Spyware Tagged With: antivirus, protection, Spyware, viruses

Viruses Prey on Mobile Phones

21 October 2008 By Saran

It should not really be surprising at how mobile phones would be the target of most viruses today. For one, they are the hot commodities we hear of today and similar to PC computing before, they are the hot target viruses want to wreck havoc on.

It is not really constrained to creating a mess. They are a challenge. Their wireless means of surfing the web and using programs that may be hard to penetrate with the basic security features is the penetration issue that any hacker today would want to conquer.

Spammers are bound to have their teeth in as well. These two juvenile delinquents of the cyber world are bound to be aggressively aching to get their name in the mobile internet issues. The opportunity is simply too tempting to pass up.

According to its annual Emerging Cyber Threats report, cybercriminals will start targeting smartphones as they are being used more frequently by users when it comes to financial matters and therefore are a source of sensitive personal data such as credit card and bank account details.

Source

Filed Under: IT Security Basics, Network Security, Real-World Issues, Security Policies, Spyware, Wireless Security Tagged With: cyberworld, mobile phones, viruses

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security