After & 39; German companies Gdata security, the number of viruses and worms classical fell last year, but there was a sharp rise in the number of new malware, or malicious software such as Downloader - Trojans, adware, spyware and backdoors. Cybercriminels are increasingly on the generation of revenue instead d & 39; simply destructive
Effective suites security should be combined virus protection, firewalls and anti-spam modules provide comprehensive solutions in a single package. It is important that each on-line adequately protected, by firewalls and anti-virus software. Although it & 39; n & 39; are not many d & 39; global epidemics in recent months, & 39; harmful activity will be under the radar, detection easy. Instead & 39; mass shipments of viruses, worms and uncontrollable, it seems that there are groups that are targeted by bot networks. Many collectors d & 39; use of data from successful companies sell e-mail addresses, credit card and financial details of the account. They also have the & 39; get access to the data and user profiles to surf, with the help of spyware and phishing & quot; the & quot;, but they also have adopted new methods . The last is & 39; infiltrate d & 39; call centers and companies that deal with large amounts of data with customers & 39; intent to steal and sell information.
Progress with l & 39; capture and arrest & 39 d & 39, a company employee Internet Telephony, during a botnet of more than 250000 computers, the malicious software, and the theft of data. The compromise was that of computers through the Internet Relay Chat commands, and flew the information PayPal accounts.
A Trojan-Dropper is usually & 39; started after a user accidentally invites a module once started, l & 39; computer security settings disabled, and the PC is now vulnerable to new attacks. Once infected, your PC can now & 39, in a large army of zombies, which can be used by more & 39; destructive activities, such as the sending of spam & amp , 39;. The majority of itself consists of executable files, or on the basis of scripting languages like Javascript or Visual Basic. Computers are more and more prepared to attack, pictures, audio files and other documents.
More of Web applications, which are not in the browser, as & 39; is the case with AJAX, are underway & D amp; 39; development under the auspices of 2.0 l & 39; Web. Given the many features of these applications, security can easily be overlooked. A high proportion of databases d & 39; information, which can be hacked, with SQL injection
The growth of 2,0-d & 39; accompanied increasingly likely that a malicious code is used in order to infect the computer, l & 39; these programs. The malicious software is often seen as a direct download under a pretext convincing. The pretext, for example, could be in the form of & 39; an update of Windows. Security vulnerabilities in the browser and the components of the browser, such as libraries, graphics, Flash, QuickTime and Real Media, can also serve to take control of the computer & 39; There are (Cross Site Scripting) XSS vulnerabilities in the security around four out of ten Web applications. With the proliferation of web 2.0, it is more and more of the malware.
Checking your virus protection online: it & 39; nd & 39, a simple examination, which allows users to determine whether their software anti-virus software can detect malicious code on Web pages: 1 Open your Internet browser 2nd Give & 39; following URL: 3rd http://www.eicar.org/download/eicar.com.txt When the browser opens the page without problems, and not a message & 39; warning that the PC is not enough protection.
Popular social networking sites, where visitors can post their own content, are also increasingly more used to disseminate malware. Myspace.com, the user more & 39; one million & 39; & quot; friends & quot; in a very short period of time for all the surfers have to provide reasonable protection against harmful software, the latest patches and AV software, which enables the latest signatures. Download the award-winning protection against spyware porter spring
Bookmark it:
Saturday, March 29, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment