Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Beware! Malicious applications Twitter Medium Threat

Posted by mps.ix.00.0109 Document | 3:36 PM | | 0 comments »

Despite the increasingly popular Twitter, Microblogging site has limitations in doing sharing website with a long URL. This is because the sharing status of this website is permitted only as many as 140 characters. The only way to shorten the link is to use utilities shortening URLs (URL-shortening). One example of these utilities is bit.ly. With these tools the user can insert a link in the 140-character limit, which will direct anyone who clicks on the URL to a longer URL and destination websites.
There is one weakness in here from a security standpoint, a person often does not know where a link leads until he clicks on the link. Clicking the link in this way really is a desperation in terms of security.
Unfortunately, malware makers have capitalized on this. Researchers at Symantec Security Response has been observed that the virtual world of criminals using the shortened URL is to distribute misleading applications. By using seductive tweet and Twitter search term commonly used, they aim to encourage other users to click on the links are shortened so that they become victims of a malicious program.
Both Twitter and URL shortening service can not be blamed for this problem. This is only one other case in which the evil attacker uses a neutral technology as a tool for fraudulent purposes. Since both services are convenient technology rapidly growing, how do you protect yourself?
The good news is Firefox or Internet Explorer browser to offer plug-ins that can check a shortened URL and show the last URL before the user clicks on the URL. Although he could not confirm whether the link is bad, at least with the browser plug-in users will be more careful before clicking. Although misleading applications currently offered in this way is very similar, we will see more variation in the future.

Threats Continue Rising Through Facebook

Posted by mps.ix.00.0109 Document | 3:33 PM | | 0 comments »

Before we stepped into a new year, be worthwhile to look back for a moment. Our friends at Symantec trying to summarize a few things about the threat of what happened in the year 2009.
- Spam Carrier Malware: Between September and October 2009 there were more than 2% of spam emails containing malware. The threat is considered dangerous, because all this spam is usually not too distracting. However, the existence of these pengingkatan, you must be more alert of incoming email.
- Increased Attack Through Social Networking Website: Year 2009 as a year can be pretty much a social networking website. Almost all people who access the virtual world certainly has one of the accounts in social networking websites available. 2009 is the year in which the attack on social networking sites and users of the site became the standard practice of criminals. In the second half of 2009, criminals increasingly use social networking websites to launch the action. In addition to the number, they also enhance their attacks send.
- Software Security Fraud: Have you received a message like this, "Found a dangerous virus on your computer. Immediately download from our anti-virus. Free! '. Be careful, Symantec has identified 250 applications that are clearly cheating by pretending to be real security software. From July 1, 2008 until June 30, 2009, Symantec received reports of 43 million experiment fake security software installation.

Threats Trend Prediction Kaspersky Version 2010

Posted by mps.ix.00.0109 Document | 3:31 PM | | 0 comments »

According to colleagues at Symantec CHIP, there will be many security threats lurking on the computer users in 2010. CHIP colleagues at Kaspersky also makes some predictions about the security threats which are likely to be a trend in the year 2010. Anything?
1. Increased attacks originating from the files on the network. Next year we will see some variation in many attacks. Malicious attacks that attack via a website or application that starts from the files shared on the network.
2. An increase in malware attacks through P2P networks. In the year 2009, we see the epidemic of malware attacks are "backed" by a malicious file that spread through the network. This attack method has been used by some viruses, such as TDSS and Virut. In the year 2010, Kaspersky security experts predict will occur in a significant increase in such attacks on P2P networks.

Vulnerability in Internet Explorer

Posted by mps.ix.00.0109 Document | 3:28 PM | | 0 comments »

This month, Microsoft released two security bulletins for eight security vulnerabilities, but none of all these security vulnerabilities that Microsoft categorized as critical vulnerabilities.

Experts at Symantec estimates that Microsoft has lowered the level of security. "Since the launch of Windows 7, Microsoft seems to have lowered the criteria file-based security vulnerabilities," said Joshua Talbot, Security Intelligence Manager, Symantec Security Response. "In the past, I think a lot of security vulnerabilities patched this month could be categorized as critical, but with protections like DEP and ASLR, the types of security vulnerabilities is not an issue for Windows 7. What I worry about are in many large companies, Windows XP still commonly used, and security vulnerabilities are becoming more dangerous on the XP system and previous systems. "

Norton 360 Version New Offer Access Remote Back Up

Posted by mps.ix.00.0109 Document | 10:13 AM | | 0 comments »

Cyber crime continued to stake out computer users. According to Symantec Security Response in 2009, the PC is not protected can be infected in just four minutes when connected to the Internet. Information and computer users' personal files at risk are also missing. In fact, Norton found that one in three adults who are online losing valuable data in their PCs.

To answer these challenges, Symantec recently launched the latest version of Norton 360. Norton 360 is Symantec's comprehensive security program. The software includes the latest security technology and remote access for data backup.