Tuesday, March 22, 2011

Understanding Computer Threats

Watch Out

This week in computer security we learned about different kinds of computer threats in class. It turns out not that spam and Nigerian letters are not the only things to look out for. There is spy ware, malware, trojan horses and worms. about but there are loads of other threats looking to take over your computer. Literally! through malware/spy ware and viruses such as Trojan hoses and worms. For the most part everyone has at least heard of these types of security threats right?? The thing that is most shocking to me was the fact that hackers are now able to turn your computer into what is known as a zombie. Sounds si-fi but it’s the real deal. A zombie computer is a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombie applications give hackers access to your machine, usually by exploiting a security vulnerability or creating a backdoor entry point. Once a cracker establishes this link, he or she can manipulate your computer. When a network of computers that have transformed into zombies they are called a botnet.
Some botnet applications allows hackers to control your computer remotely. Others give the hacker the ability to look at your private information and steal your identity. Unfortunately it is hard to get your computer out of a botnet and that is even if you knew that your computer was part of one. If you think it may be you should try a  system restore( restoring your computer to the state it was last in when saved) or if that dosen't work take it to a computer professional.

System Restore 
 If you ever are suspicious and need to do a system restore heres how to do one


1. Go to your system control panel
2. Click System & Security Tab
3. Restore Files

Here's how it looks http://screencast.com/t/qh43kh9t

I have windows 7 on my pc so it may be diffrent on other pc's but it will still be under the same tab generally. Here's a link  for exactly how to do a system restore.

http://www.ehow.com/how_2266976_do-system-recovery.html





Symptoms Of A Botnet

  • unusually slow computer
  • your hard drive running even when you are not active on the computer
  • you have items in your sent folder that you did not send
  • your software programs suddenly don’t run
 To protect yourself from these attacks make sure you apply anti virus and operating system patches and shut of your computer when not in use.
 

In the link below is a video which describes a clever scheme hackers use get money from you. Fake anti virus software is on the rise and are being made everyday to trick you. Some of these schemes are even on legitimate sites. for instance if you are trying to watch a video sometimes certain sites will ask you to download a special ad on to be able to play the video. Hackers have exploited this by using these pop up boxes to instead download misleading software to your computer. Once downloading it the tells you that you have a virus. It also goes over why Norton security is a great anti virus to have. Norton security alerts you of risks before you download them preventing unknowing downloads of malicious software.


 
<object width="640" height="390"><param name="movie" value="http://www.youtube.com/v/kMLYwfSy8YE&hl=en_US&feature=player_embedded&version=3"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/kMLYwfSy8YE&hl=en_US&feature=player_embedded&version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="640" height="390"></embed></object>






Hope you enjoyed.


computer hacker cartoons, computer hacker cartoon, computer hacker picture, computer hacker pictures, computer hacker image, computer hacker images, computer hacker illustration, computer hacker illustrations

Monday, March 7, 2011

Understanding Phishing, Pharming, Spam, and Scams

This week in computer security we learned about different types of ways criminals use to obtain your information. Methods used are phishing, pharming, and spam.

  • Phishing is when fraudulent emails that appear to be from a legitimate source are sent in an effort to obtain sensitive information from a user.
  • Pharming occurs when a fake website is set up that appears identical to a real website, but instead carriers malicious software that could be used to deliver viruses, capture every keystroke you type, or install software that will allow someone else to have remote access and control over your computer. Pharming effectively eliminates the need for "bait" emails and is therefore potentially more dangerous than "normal" phishing scams and can cast a wider "net" in which to snare victims. Even phishing-savvy web users could fall victim to a pharming scam without realizing it.
  •  Spam is the emails you get offering enhancement drugs, herbal remedies and software among other things.
Right now in my spam inbox I have ten messages. This is only a weeks worth of spam so ten is not so bad compared to the hundreds my boyfriend gets weekly. Thankfully yahoo has a great spam blocker and I unsubscribe from any emails from stores who offer me so called "savings" and I delete any message from unfamiliar web addresses. One of the spam emails sent to me claims in the subject line to be from COMPENSATION 2010. Ironically they are a company that claims to have gotten scam victims 2.5 million dollars for phishing attacks that have resulted in identity fraud. Although I find internet crime despicable the way high tech criminals prey on unsuspecting people any one would have to admit that some of these schemes are pretty clever. For instance in 2010 when the census was conducted scammers posed as census workers to collect data. Scammers tricked people into giving out their banking and other personal information.

The best thing to do to try to reduce these crimes from happening is if and when you do receive a suspicious email DELETE IT. Also you can forward the email to spam@uce.gov or www.ftc.gov/bcp/con-line/edcams/spam/report.html then DELETE IT. Don't give out your personal information online unless it is a trusted site that has https and a padlock icon in the address bar. And last but not least just use common sense. How plausible is it that you live in New York or any where in the U.S. for that matter yet somehow you one 500,000,000 in the Camen Islands? Or that someone is going to pay you money to cash a million dollar check? The odds are not that high.

phishing cartoons, phishing cartoon, phishing picture, phishing pictures, phishing image, phishing images, phishing illustration, phishing illustrations