Friday, July 5, 2013

The most active security holes - first part

          Internet is the main source of our computer infections. The most popular sites and online services  hide ingenious traps. Learn what they are and how you can stay away from them.
Warning: the internet is not always what it seems.
          Even known websites with great popularity, with back strong companies and institutions can be a mask for something else. Some just hide the interests of marketing, promotion and advertising, but others turn into real weapons against our computers. Bots that promise answer to any questions, videos watched online or fake security programs, downloadable from very inviting websites will turn into a key that opens the gateway to the resources of your PC.
          Can you harness the most powerful and expensive antivirus and security solutions without information you can not provide shelter. This article aims to reveal just the most active such pitfalls of the internet, for the future, not to fall into the category of victims and you can enjoy the good parts of it.
          You will meet and the nature of software vulnerabilities. Yes, but all the internet is one that diffuses most applications that can turn into a real Trojans.
          Each category of International traps will be accompanied by an indication of the degree of risk, as well as a section of recommendations for avoiding them.

1. ADOBE FLASH websites

          Adobe Flash is a player embedded in browser that allows viewing online multimedia materials, and run directly from sites other animation applications. Is thus present on 99% of computers connected to the Internet, which makes it a favorite target for malware.
But the problem is not the player itself, but its how to manage their cookies. Specifically, when you access online video, will retain certain information on that page (eg, how do you set the volume). These cookies are not deleted together with the others. Conclusion: a large entrance gate viruses and ensuring their presence long as the host computer.
PROTECTION
          Well, the most effective method to be as safe as is to update as frequently as application (get. Adobe. Com / flashplayer). You may be wondering how you can block access to these cookies. There are several methods. For example, the Firefox browser are dedicated to Better Privacy extension. But the most direct way is to access the control panel of the player from the Macromedia website (www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html). Here you can see the whole list of sites that already have cookies stored on our computer, but what is more important, you can limit the disk space used by them. 
          Adobe Flash Player: once arrived at the spot, access Global Storage Settings, Set the slide bar to the far left and uncheck all options found below. Then, goto  Website Storage Settings and act similar.

2. QUICKVIDEO BASED MEDIA

          But attackers are not limited to Adobe when it comes to players. Another similar application persistently hunted is QuickTime, another player used for viewing online content. Both Windows Users, and the Mac faced with numerous infections based on the mentioned program.
PROTECTION
          Again we recommend a regular update. The Apple and Windows quite frequently launch such packages for QuickTime and Windows Media Player.
          Another recommendation, but as general, is to not download any video. Make sure the source is reliable and that you really need that clip.
          Asking us the source of the problem, we found that statistically cybercriminals are using RTSP protocol. Dodging us to enter data too technical, we merely recommend disabling this option (see picture).
          QuickTime: go to File> Preferences> QuickTime Preferences. In the new window, click on Advanced registry. Here uncheck RTSP Proxy Server.

3. FALSE SECURITY APPLICATIONS

          Ironically, it was precisely those who should protect you turn into time bombs. Fake security applications look and behave exactly like the real ones. The first sign of danger warnings are becoming more aggressive.
          The internet is the culprit this time. Sites victims draw ears or hidden insistently recommending installing a security tool to computer healing. Some go even further: offer trial versions, hoping the prices very competitive to attract more clients. I mean, after a virus that is stuck with more and pay for it! Height of shamelessness!
PROTECTION
          It is clear that we should not be fooled downloading unknown solutions from suspicious addresses. But ingenuity of those who are behind these applications is sometimes exuberant, sometimes reaching our computers they matter how cautious we are. Once arriving there, they start to behave as such. If you see warning messages that do not come from the official antivirus, stop all activity and restart the computer. Try to enter in Safe Mode (holding down F8 at startup) and follow a full scan using antivirus real. It is possible that malicious application missing from antivirus signatures and then you have to resort to a tool that detects danger only after virus behavior in the system (as ThreatFire).
So, before downloading an exotic security solution, take a look at one of the sites that offer lists of fake gear. Such a pretty complete database is available at  www.spywarewarrior.com/rogue_anti-spyware.htm.

4. Automatic update drivers

          At about the same hazard category and applications get updated dedicated drivers. Specifically, are those programs that offer to scan your drivers installed on your computer, and will compare them with the latest versions appeared on the websites of manufacturers to install in place of the old. In theory it sounds good, but once left open, these applications can be fooled by fake drivers shuffled trusted sites or act just like false security applications.
PROTECTION
          You do not have to be drastic. You can still use these applications, but only to detect outdated drivers. Then download alone on the official websites of manufacturers, new drivers.
          An updated antivirus will detect suspicious discharges. So do not forget to armored with new antivirus signatures often.

5. Infested PDF's

          Behold, slowly but surely infected PDF attacks came on top of profile charts. According to Symantec statistics, in 2009 they had reached 49% of all attacks launched from the Internet. Tremendous growth, considering that a year ago was only 11%.
Operation: slipped under false names reliable websites will speculate PDF customer programming errors, infiltrating your computers, especially to steal confidential data.
          A new wrinkle is to insert something apparently useful in the PDF attachments with viruses. When you open such a document, the customer will be offered to open PDF and attachment. A bad idea would be to and confirm the action ...
PROTECTION
          Because Adobe Reader is the most popular PDF client, it is normal for it to be the most vulnerable. Therefore, perhaps it is time to call a competitor leaner and more secure, Foxit Reader (www.foxitsoftware.com/pdf/reader/).
          If you want to stay true to the Adobe solution, at least make sure you are using the latest version (get.adobe.com / reader /).
          But if both applications disable function allows opening non-PDF attachments will save the other emotions (see picture).
          Adobe Reader: function uncheck Allow Opening of non-PDF file attachments with external application following the path Edit> Preferences> Trust Manager.

0 comments:

Post a Comment