• Home
  • About
  • Archives
  • Authors
  • Contact
  • Polls
  • Small Biz Interviews
 

Posts Tagged ‘Malware’

WANTED: Your Confidential & Sensitive Data

Friday, April 8th, 2011

Guess what? Your credit card number is less valuable to attackers today. Too bad they still want it, along with you Facebook credentials. We know this how? Recently Symantec released another security report. The security report said that the price of stolen credit cards dropped dramatically from previous years. The drop off is due to numerous factors, but one thing that seems to stand out is the amount of credit cards there are in circulation. Since there are so many credit cards avaliable, these sellers have to lower their prices if they want customers.

However, while credit cards have dropped in value, peoples social network credentials are becoming more valuable. During the past year, botnets were seen sweeping Facebook and other social networking sites for login credentials. Why are peoples social network credentials in demand? If attackers gain social network credentials, they can then use those platforms to launch malware attacks and spam campaigns. These attacks are often more successful. Why? Since many people divulge a lot of personal information on sites like these, an attacker can comb through a user’s profile and imitate them well enough to fool people into clicking on links that have malware embedded in them.

Since many of these malicious link are shortened, it is a challenge for social networks to determine which of the shortened links are trustworthy.  Remember that article I wrote on hacking toolkits? Well many of these toolkits are used to initiate these malware attacks, because many of them use Java. Since Java can run on almost any platform and browser, this means that these attacks cannot really be avoided by switching platforms or browsers. All of the toolkits have a high infection rate, which means that the infections can spread very fast and to a wide number of users if the toolkits are used. Social networks are also targeted because they enable attackers to get access to business information which can then be used to get sensitive data from those businesses attacked.

One platform that has not quite been hit by attacks is the mobile platform. Currently, very many people do not not use their mobile devices for online banking and other sensitive data transactions. Thus there is no real incentive for attackers to seriously target mobile devices. (They still do target them and the number of attacks is increasing, but there have not really been any widespread attacks.) However, as mobile devices become more sophisticated and as more users start using them for online banking and other sensitive data transactions, attackers will quickly start targeting mobile devices in rapid numbers.

What do you think of this?

Post to Twitter Tweet This Post

  • Share/Bookmark
 
 

Posts Tagged ‘Malware’

Hackers: They’re back and are coming to get you! Steps to Fight Back

Monday, January 31st, 2011

What’s back? Hacker’s toolkits! There are new hacker’s toolkits out there that are user friendly. So, your computer could be in danger from any number of foes. It could be the kid next door, the person sitting across the table in Starbucks, some computer geek in an internet cafe in India. How do we know this? Symantec released a new report about this. These toolkits are priced anywhere from $40 to $40,000.

So, what exactly do these toolkits do?  They let people who have a little knowledge of coding to design malware to hack your computer. The big difference between these toolkits and the original ones is that these new toolkits use many different attack vectors. With the old toolkits, once you knew the software patch, the malware couldn’t get in. The toolkits exploit the vulnerabilities in a computer. Usually the malware gets in through the web browser and its plug-ins.

Then, the software usually installs a keylogger which steals things like online passwords and turn computers into zombies who infect other computers. Why through the web browser? Since most of the major software holes have been patched up, it has become harder to get malware onto a computer.Signs show that these toolkits are pretty effective. According to PC World, $70 million was stolen from bank accounts using the hacking toolkit Zeus. Plus these kits are often like regular software. They get constant updates, so they have the newest and most potent version of malware.  These toolkits are also attacking multiple software at once, so chances are that one application may be unprotected and the attack is more likely to succeed.

So, what can be done to protect your computer from these threats? Just the usual of keeping all of your system software, virus definitions, etc.. You also shouldn’t use Internet Explorer, but Firefox and Chrome are targets too. [The article didn’t mention anything about Opera though.] You can switch to Linux, but it takes a while to get used to. [I haven’t used Linux, so I don’t have an idea of how different it is. All I know is that it’s different.] You can also install a browser extension, such as FlashBlock(For both Firefox and Chrome), that’ll block any flash code on a website unless you opt to let it run.(YouTube is whitelisted.) Also make sure you’re using a reputable brand of antivirus softarware.

So what do you do to protect your computer from these threats and what do you think about these toolkits?

Post to Twitter Tweet This Post

  • Share/Bookmark