What does it mean that their distributions have in common? Thinking about it will help ordinary Web users realize how to behave online and what to avoid.
What does it mean that their distributions have in common? Thinking about it will help ordinary Web users realize how to behave online and what to avoid.
...What does it mean that their distributions have in common? Thinking about it will help ordinary Web users realize how to behave online and what to avoid.
...What does it mean that their distributions have in common? Thinking about it will help ordinary Web users realize how to behave online and what to avoid.
...What comes to mind? First, send an e-mail through contaminated spam. It is possible (and not too difficult for, say, a programmer) to attach almost anything in your favor. With more effort, a programmer can create messages without the attachments that will infect your computer anyway.
Although many e-mail service providers offer a basic anti-virus protection, they are not obliged to do so. How is this protection -. It is another matter
In addition, spam is very cheap to distribute. Of course, spammers of all stripes do not use their own machines. Why would they? They prefer a computer that has become a remotely controlled after they are infected with a particular program. Internet criminals to build a large network of such machines, and hire them to spammers. The use of "bots" (they are also called "zombies" or "slave computer") gives the spammers so prized anonymity -. Spam messages appear frustrated computer users with IP addresses registered somewhere on the other side of the world
In addition, spam is very cheap to distribute. Of course, spammers of all stripes do not use their own machines. Why would they? They prefer a computer that has become a remotely controlled after they are infected with a particular program. Internet criminals to build a large network of such machines, and hire them to spammers. The use of "bots" (they are also called "zombies" or "slave computer") gives the spammers so prized anonymity -. Spam messages appear frustrated computer users with IP addresses registered somewhere on the other side of the world
...In addition, spam is very cheap to distribute. Of course, spammers of all stripes do not use their own machines. Why would they? They prefer a computer that has become a remotely controlled after they are infected with a particular program. Internet criminals to build a large network of such machines, and hire them to spammers. The use of "bots" (they are also called "zombies" or "slave computer") gives the spammers so prized anonymity -. Spam messages appear frustrated computer users with IP addresses registered somewhere on the other side of the world
...keyloggers -. data-stealing programs
keyloggers, as is clear from the name of the program, log the keys - but it's not all. They love everything that the user is running - keystrokes, mouse clicks, files opened and closed, sites posjetili.Malo sophisticated programs of this type to capture the text window and make screenshots (record everything on the screen) -. So that information is captured even if the user does not type anything, just a view of the file
Blogs can be contaminated with malware, too. In April, experts from Websense Security Labs warned users that they have discovered hundreds of these "toxic" (contaminated malcode) blog is set up by hackers. Blogs are suitable for them. There are large amounts of free storage, with no identity verification is necessary to set up, and does not scan posted files for viruses, worms, spyware, or in most blog hosting services
Three months ago, and here's a quote from the new Websense report published this Monday, July, 25: "Hackers are using a free personal web hosting sites that nationally and internationally-known ISPs to store their malicious code ..." In July this year, Websense discovered that these places are used for this purpose more often. The company's senior director of security and technology research is a saying that "in the first two weeks I have found more instances than in May and June combined." In any case, this tendency is a very disturbing one.
Three months ago, and here's a quote from the new Websense report published this Monday, July, 25: "Hackers are using a free personal web hosting sites that nationally and internationally-known ISPs to store their malicious code ..." In July this year, Websense discovered that these places are used for this purpose more often. The company's senior director of security and technology research is a saying that "in the first two weeks I have found more instances than in May and June combined." In any case, this tendency is a very disturbing one.
...Anonymity - An unprotected end-users - at no cost. What else can cybercriminal desire? That is why there was an outbreak of "toxic blogs" in April - and that's why infected free sites are multiplying so fast now
.However, in order to contaminate as many computers as possible? It aims internet criminals, right? More traffic, more programs falls to the end users computer. Hackers to attract traffic to malicious websites by sending a link through spam or SPIM (spam for analog instant messaging (IM ).
They are ingenious in finding new ways to get people to open an attachment or clicking on the link to visit a certain web page, even though people were constantly told not to follow links in spam.
are just some of their dodges - disguising infected e-mail spam as CNN news alert, the subject lines with "breaking news" as "Osama bin Laden caught", "Michael Jackson tried to commit suicide." How about celebrities in the nude? Just click! And, one of the newest, "amateur video" that allegedly shows the bombing of London landmarks.
These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists -. Big bucks that crimes like online banking fraud can bring them into a serious student of
These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists -. Big bucks that crimes like online banking fraud can bring them into a serious student of
...These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists -. Big bucks that crimes like online banking fraud can bring them into a serious student of
...These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists -. Big bucks that crimes like online banking fraud can bring them into a serious student of
...81% have become more cautious about email attachments
0 comments:
Post a Comment