IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

How To Catch a Worm in a Network

11 November 2010 By Saran

Worms and Trojans can make their way into local intranets fast if you don’t have a good firewall to protect your networking environment. Most of it originates from overlooked files like granting access to the Internet for specified users. But rest assured, unless you document and orient these people on potential risks, chances are the ones to whom you grant access will be the bane of your network security issues.

A worm can multiply fast if not contained immediately. For one, it can affect the whole network. So how do you go about it?

1. Unplug all the computers from the network. Cable disconnection would be a good start. If they are not connected, then there is no place for them to go. Depending on the number of workstations, you may have your work cut out for you. But at least it defeats the need to come and go from one workstation to the other once one is cleaned.
2. Scan the computers manually using a CD. As much as possible use a write-once optical disc. This way, if you find the worm or virus, you have it cornered. There is no place to hide nor go for them.
3. Restart and make a second check. Make sure everything is clean for one workstation. Do this for the rest of the computers that have been potentially affected.

This process requires a lot of patience. But it beats having to turn to the usual formatting and clean everything from scratch. It is indeed demoralizing, but the thing is, you just have to deal with it since better security policies need to be enforced on your end as far as users are concerned.

Filed Under: Malware, Network Security Tagged With: Malware, networkin, trojans, worms

Precautions with Bluetooth Connections

13 July 2010 By Saran

Among the features that most mobile phones have today is that of features that include the Bluetooth and Infrared connectivity as a means of wireless connections. While such advancements has made it easier for people to transfer files such as images and sounds from one phone to another, it also becomes a loophole to allow viruses to infect the operating system of mobile phones today.

Cabir Bluetooth Precaution

Worms such as Cabir, have become the onslaught of rampant mobile phone intrusions, something that uses the Bluetooth connectivity as a means of infecting mobile phones of today. Once they get through, malfunctions and error messages are sure to ensue, making it a need for the software systems of mobile phones of today to be either formatted or disinfected with available anti-virus and worm removers such as Panda Software.

Inconvenient as it may seem, it is advisable for mobile phone owners to refrain from activating their Bluetooth connections to avoid such infections and untoward intrusions at any time.

Filed Under: IT Security Basics, Malware, Operating Systems, Real-World Issues, Spyware, Tips, Wireless Security Tagged With: bluetooth, cabir, connectivity, viruses, worms

Careful of Unknown Links in Messaging

6 July 2010 By Saran

Trojans hacks and worms can easily enter a person’s computer by a mere click of a link. Instant messaging, the new trend in adhering towards faster and easier communication anywhere in the world has been enhanced thoroughly, going to the extent of allowing links to be followed, sometimes generated automatically from infected computers. Such are done even when offline messages are left, such as in Yahoo Messenger issues.

Instant Messages

The best way to avoid such links is to refrain from clicking on links without prior notice from the actual user. While most people would rely heavily on the level of relationship that they would have with their online buddy, it is still best to double check and verify before proceeding on the site link.

Being infected is quite painful that it leads to even formatting the entire system. This holds true for people who are not aware or have the time to clean it manually and methodically. Hence, the best way is to be more cautious, especially when peculiar links are met.

Filed Under: IM, Instant Messaging, IT Security Basics, Malware, Spyware, Wireless Security Tagged With: hijack, Instant Messaging, trojans, worms, yahoo-messenger

Ants Versus Worms

29 September 2009 By Saran

antNot everyone hates worms – the natural kind, that is. I still remember classmates from grade school (even high school!) who grossed out everyone else by eating worms in their natural state. I am talking about a different kind of worm here, though; the kind that everyone hates; computer worms.

Pretty soon, we just might have ants on our side to combat the threat that worms pose year in and year out. Researchers in the field of IT security have been working on a project to combat worms, drawing their inspiration from the common ant. The Daily Tech tells the story:

Security researchers found inspiration in the common ant. Describes Wake Forest University Professor of Computer Science Errin Fulp, “In nature, we know that ants defend against threats very successfully. They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system.”

WFU created digital “ants” — utilities that migrate from computer to computer over networks searching for threats. When one locates a threat, others congregate on it, using so-called “swarm intelligence”. The approach allows human researchers to quickly identify and quarantine dangerous files by watching the activity of the ants.

The implications are tremendous. Anti-virus software that is commonly used today usually take up a lot of resources, and make computers slow down. With this new technology, we just might see a whole new breed of anti-virus programs. While everything is in the research and development phase still, it does give us a bright future in terms of fighting malware!

Filed Under: Malware, News Tagged With: antivirus, ants, it-security, Malware, worms

How To Optimize Websites and Be Safe

21 September 2007 By Saran

It is perhaps the dream of most sites to be one of the known sites that will be included in the affordable search engine optimization practices we have today. Many have resorted towards link building and other known online marketing practices and have paid dividends by entrusting the same to companies such as Los Angeles SEO.

But of course, there are security concerns that most people take into consideration today. One is that potential worms and Trojans may just take the place of a site, providing the irritating pop-ups which are usually the origin of these said worms and banes of the Internet.

While search engine optimization is what many web and blog site owners are aggressively seeking, just make sure you do it the professional way and avoid the scam and spammers the web holds as well today. Rather than becoming an ideal site, you may just find your site the least one to be visited at any given day due to hazards many are avoiding.

[tags]search engine optimzation, seo, online marketing, security, worms, trojans[/tags]

Filed Under: IT Security Basics, Malware, Network Security, Real-World Issues, Security Policies, Spyware Tagged With: online-marketing, search-engine-optimzation, security, seo, trojans, worms

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security