Malware Unleashed

The ‘always-on’ connection of the modern, high speed Internet is creating an environment conducive for spreading computer malware. Malware is generally defined as software inserted into computers causing harm to that computer or a system of computers. Computers infected with malware may be used in ways not intended by their owners.

There are many types of computer malware with varying degrees of malevolence. Listed below are some of the more common types of malware, how they are used by hackers and the severity of the attacks.

Adware – These are software designed to display or download advertisements. Adware is common on software downloaded from the internet. There is a limited time period when the software runs with all features enabled. Upon expiry of the free trial period, the user is advised to purchase the “full copy” of the software or else the program runs on “crippled mode”. Of course there is another way of enabling full functionality. The user simply allows the software to display advertisements.

» Read more

The Clean Up Procedure to Remove Malware and Viruses with External Scan

In continuation to previous articles on removal of malware (malicious software) from Windows machine that is infected, everyone facing the problem will tend to argue that it’s better to scan infected machine from outside to overcome the effect of defenses within the malware. The preferred option is to use anti-malware programs on boot CD for Window (UBCD4WIN); the CD can use two methods to clean malware from infected machine – one the network access and second the software with Ultimate Boot CD to be used with windows.

» Read more

To Detect Malware Scanning Needs To Be Done Externally

Few days back Brain Krebs had stated in his blog at WashingtonPost.com about how money was stolen from them due to malware on their computers.

Slack Auto Parts located at Gainesville was one of the companies that lost about $75,000 when cyber burglars were able to plant malware on Windows PC of controller to break the internet security. These internet hackers were able to access company’s bank accounts; they were able to create new user accounts at the bank and get money out of it. All this was done in spite of internet security in place. The interesting part of the story is that the anti-virus software in PC was not able to detect malware. Also the cyber security expert hired by the company also gave a clean chit to the health of the system which was in fact infected by a malware. The affected company was not convinced and hence went for second opinion and it was then “Champi” a Trojan horse program, a malware was detected.

» Read more

Conficker Is Down But Not Out

The much dreaded Conficker, which ruined many a sleep, has faded away completely from public memory. However, Trend Micro’s Malware Blog and Conficker statistics do not agree with this.

Conficker is a worm that grabbed the attention of the Netizens at the beginning of this year. It occupied much web space due to its high infection rate; part of it was just hype. After the much talked about April Fool’s Day threat went undetected, it slowly started losing its stranglehold on the web world. People started forgetting the ruckus created by Conficker.

» Read more

Malware to target Harry Potter fans

Cybercriminals are pushing “blackhat” search engine optimization tactics to target the most popular file sharing and P2P networks, pursuing those interested in upcoming movie releases and in particular taking advantage of the sizeable Harry Potter fan base wanting to download the movie in advance of its screening.

» Read more

How To Keep Your Computer Malware-Free

There is partial truth in the statement given by conspiracy theorists – You are being watched by someone. Software that gathers your personal information without you being aware, brings undesired change in the configuration of your computer or takes the control of your computer is called malware or spyware. The first step in protecting your computer system is detection of malware in order to remove it and save the system from damage. The second step is to keep malware away from your computer.

» Read more

Protect yourself against phishing attacks

Malware is becoming increasingly sophisticated and prevalent. Cybercriminals are continuously developing advanced techniques to lure you into their traps. You don’t have to go out of your way to visit dodgy websites to get scammed these days. Cybercriminals will lure you there by pretending to be legitimate sources of information.

» Read more

Avira Premium Security Suite 8.2 Review

Avira’s security suite is more suitable for a techie looking for an ideal malware detection system that doesn’t need parental controls or phone support.

Avira Premium Security Suite topped in the very task for which it has been created and it costs only $54 for single user according to the information collected latest by 23rd Nov. 2008. This product has continued the well-known performance of all other past products of Avira, by convincingly staying ahead in the test of “Paying for Protection”, for our nine security suites test, 2009 and in several other detection tests.

» Read more

Comodo Internet Security Pro

The first generation suite of Comodo still has a long way to go.

Comodo Internet Security Pro 3.8 is the first version of its kind in the market of Internet security suite, whose price for single user (one year) is $40 and its three user license hasn’t been listed yet as of May 5, 2009. According to our testing and use, Comodo Internet Security shows that it is indeed its first time to come out in the market, as its performance was not at all convincing. While we were testing the Internet Security Pro 3.8 it was reported that, Comodo released its next version, Internet Security Pro 3.9. With this new release Comodo tried to fix some of the performance related problem with the Internet Security Pro 3.8 like, the dynamic file inspection, which was included to act as a real time virus scanner.

» Read more
1 2 3 4