11 Kasım 2012 Pazar

Microsoft Security Essentials

The only free security product we've tested this year, Microsoft's Security Essentials, is our default recommendation of what to install to provide your PC with a bare minimum of protection against malware. It's only available for Windows 7 and below. Windows 8 has its own integrated Windows Defender, which looks just like Microsoft Security Essentials in terms of its interface, but which appears, in preliminary tests, to behave differently when confronted with malicious software. Security Essentials protected our PC in 85 per cent of malware exposures. Admittedly, it only completely blocked 57 of 100 viruses, but it neutralised another 28 after the process of infection had begun. In 15 cases, it failed to protect us. That's better than having no protection at all, but 15 infections is not good. It did well in our false positive tests, only blocking one legitimate program, giving it a total accuracy rating of just 233.5. Once you've installed it, Security Essentials prompts you to begin an initial scan. With that done, it'll schedule a weekly quick scan and use real-time protection to monitor potential threats as you encounter them. The main screen informs you of whether or not your PC is protected and Security Essentials is active and up-to-day, as well as giving you instant access to quick, full and custom scans. The Update tab is exactly what its name implies: you get an update button and information on the last update times of your virus definitions. The History tab is a bit more interesting, displaying a list of all the quarantined items that have been prevented from running on your PC. You can permanently remove them or - if you're sure a program really is benign - restore it, although it's worth bearing in mind that Security Essentials has a very low false positive rate. You can also view lists of items that you've allowed to run and which have been detected as potential issues, but neither quarantined nor allowed. The final tab gives you fine control of Security Essentials' settings. As well as scheduling scans and enabling real-time protection, you can customise the way the program deals with the threats it detects, depending on how severe it believes them to be and exclude specific files, processes or locations from your scans. You can also enable the scanning of removable drivers and change the amount of information Security Essentials sends back to Microsoft about potentially unwanted software. Microsoft Security Essentials is brilliantly simple and easy to use. For obvious reasons, it integrates perfectly with Windows. However its relatively low rate of malware detection makes it a distinct second-best to the commercial anti-virus suites we've looked at this year. It'll do as a stopgap, but we strongly recommend buying Kaspersky Internet Security 2013.

29 Eylül 2012 Cumartesi

Security Overview Part 2: Spyware

According to the Wikipedia, spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. That is, spyware will monitor your activity on the Internet and transmit that information in the background to someone else. Spyware is potentially dangerous because it can record your keystrokes, history, passwords, and other confidential and private information. Some software that you use may act like spyware although is actually (and innocently) communicating with its developer to do things as check for program updates or provide the developer with error information (for future development). Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. So, spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else (Webopedia, 2005). Although there is no guarantee that you’ll always be free from spyware, there are some things you can do to seriously lower your risk. First and foremost, you need to use an anti-spyware program that detects and prevents spyware from installing itself on your computer (and removes it). Anti-spyware software can also periodically scan your computer for spyware that may get through and remove it. Following are several of the most popular free anti-spyware programs: • Spyware Blaster • Ad-Aware SE Personal Edition • Microsoft Windows AntiSpyware • Spybot Search & Destroy Personally, I use two of the above programs (Ad-Aware and Microsoft AntiSpyware) because no one anti-spyware program is known to catch 100% of all spyware. The two together seem to do a fantastic job of keeping me spyware free. Remember, your anti-spyware software needs to stay updated, on a daily basis, to stay effective at catching all the newly developed spyware. And, your anti-spyware program should automatically run system scans on your computer at least once per day. Ad-Aware SE Personal Edition does not do either of these automatically (you have to do it manually) although Ad-Aware SE Professional edition does (this will cost you about $40). Microsoft’s AntiSpyware software does scan and update itself automatically. Also, here are some other steps to consider to reduce your risk of being infected by spyware : 1. If you use Windows XP, one way to help prevent spyware and other unwanted software is to make sure all your software is updated. Visit Microsoft Update to confirm that you have Automatic Updates turned on and that you've downloaded all the latest critical and security updates. 2. While most spyware and other unwanted software come bundled with other programs or originate from unscrupulous Web sites, a small amount of spyware can actually be placed on your computer remotely by hackers. Installing a firewall or using the firewall that's built into Windows XP provides a helpful defense against these hackers. 3. Don’t click on links in e-mail spam that claim to offer anti-spyware software. Some software offered in spam actually installs spyware. 4. Surf and download more safely. The best defense against spyware and other unwanted software is not to download it in the first place. Here are a few helpful tips that can protect you from downloading software you don't want: a. Only download programs from Web sites you trust. If you're not sure whether to trust a program you are considering downloading, ask a knowledgeable friend or enter the name of the program into your favorite search engine to see if anyone else has reported that it contains spyware. b. Read all security warnings, license agreements, and privacy statements associated with any software you download. c. Never click "agree" or "OK" to close a window. Instead, click the red "x" in the corner of the window or press the Alt + F4 buttons on your keyboard to close a window. d. Be wary of popular "free" music and movie file-sharing programs, and be sure you clearly understand all of the software packaged with those programs. (Source: Microsoft Corporation)

14 Eylül 2012 Cuma

Foreign journalists in China targeted by malware attacks

BEIJING (Reuters) - Foreign journalists in Beijing have been targeted by two very similar malware attacks in just over two weeks in the lead-up to China's once-in-a-decade leadership transition. The emails - one appearing to come from a Beijing-based foreign correspondent and the other from a Washington-based think tank - both contained an attachment with the same type of malware, according to independent cyber security expert Greg Walton who reviewed the files. Malware attacks on foreign correspondents in China, Chinese dissidents or academics researching China tend to spike in the periods leading up to politically sensitive events for China. Previous spikes occurred ahead of the Beijing Olympics in 2008 and the 60th anniversary of Communist Party rule in 2009. A government spokesman warned against jumping to conclusions about who was responsible. "China manages the Internet according to law and has engaged in cooperation with the international community to promote Internet security. Internet security is a complicated issue," Foreign Ministry spokesman Hong Lei said when asked about the emails. "China is also a victim of Internet attacks. The source of these Internet attacks is very difficult to determine. Reaching conclusions without sufficient evidence or fair and thorough investigations, it's just not serious." Both of the emails referred to the upcoming handover of power in the top ranks of the ruling Communist Party. The attachment, if opened, would have installed malware that sent encrypted information from the user's computer to an external server. That server is hosted in Britain. It has often proven difficult to prove who is behind malicious hacking attacks related to China. "The Chinese government often gives blanket denials that this happens, and in some cases the left arm may not know what the right arm is doing," said Duncan Clark, chairman of technology consultancy BDA in Beijing. The Communist Party will hold its party congress some time in coming weeks in Beijing, although the date has not yet been announced. At the congress, the top positions in the party are expected to be transferred to a new generation of leaders.

29 Ağustos 2012 Çarşamba

Operating System Security

Operating System Security Network Security Library {http://www.windowsecurity.com/whitepaper/} This is a site providing articles on general network and system security, and no emphasis is placed on any one OS. Due to the large number of articles available on Unix and Windows, these systems have their own links; articles on other operating systems, such as Macintosh or Linux, can be found through keyword searches. Articles come from a variety of sources, including individual submissions as well as published book chapters. Readers are invited to rate articles on a scale of one to ten, and the average score and number of votes are listed with each article title. Windows Security Guide http://www.winguides.com/security/ This site lists security vulnerabilities and fixes for all Microsoft operating systems, as well as for network-related utilities such as MS Internet Explorer and Internet Information Server. Other services include a free newsletter of alerts and updates, and "support forums" for discussion of security topics. There are two levels of membership: the basic free membership allows access to the forums and newsletters, while a fee-based premium subscription option allows access to help files, free downloads, and the ability to turn off advertisements. Macintosh Security Site http://www.securemac.com/ The Macintosh Security Site contains several informative articles on Macintosh security, and reviews of many security products for Macs and Mac servers. While the site is supported through paid advertisements, the ads are rather unobtrusive. Of interest is the fact the Macintosh Security Site is maintained as the "white side" of Freak's Macintosh Archive, a "hacking" site devoted to announcing and exploiting security vulnerabilities in Macintosh software & utilities. Linux Security http://www.linuxsecurity.com/ This site is sponsored by Guardian Digital, Inc., an Open Source security company which produces EnGarde Linux products. The site is not used solely to advertise EnGarde products, and other vendors and products are represented through their sponsorship of the site as well as in articles and advisories posted at the site. The News section of the site provides full-text articles, reprinted from a variety of external sources, on a wide range of general and Linux-specific security topics; the Documentation section features numerous practical "how-to" articles. Users can subscribe to free weekly Linux security newsletters and advisories and participate in an online mailing list.

14 Ağustos 2012 Salı

eScan Internet Security Suite

eScan Internet Security Suite The Next Generation Anti-Virus, Anti-Spam and Anti-Phishing Solution for Windows®-based Home and Small Office Users eScan Internet Security solution designed for home and small office users is a comprehensive Anti-Virus and Content Security Solution that provides complete protection to your computers against objectionable content and security threats, such as Viruses, Spyware, Adware, Keyloggers, Rootkits, Botnets, Hackers, Spam, Phishing Web sites, and range of information security threats. Anti-Virus Anti-Phishing Anti-Spyware Anti-Rootkit Anti-Spam USB Control Application Control Web Protection Virtual Keyboard Gaming Mode Laptop Mode Folder & File Security Network Traffic Monitor User-based Parental Control Firewall Privacy Protection Identity Theft Prevention Malware URL Filter Key Features : Trendy & Easy to Use Graphical Interface With eScan Internet Security Suite you get a trendy, dock-based graphical interface that is very user-friendly and has a very sleek intuitive design for both, novice and expert users. Best Protection against Security Threats without Compromising with the Computer Speed eScan 11’s new On-Demand Scanner is equipped with Whitelisting Technology that leads to faster scans and is very light on system resources. This ensures that your computer does not slow down, even while eScan is performing thorough system scans. Effective Real-time Protection to all the Files & Folders Residing in the Computer eScan 11 performs Real-time scans on files, e-mails, e-mail attachments with its advanced and innovative technologies. It keeps your computer safe from infections with the help of its enhanced Self Protection Technology that prevents new generation malware from either disabling eScan or deleting its critical files, thus keeping your computer safe from infections. It also scans content for confidential data, prohibited information, offensive, and obscene language. Block Notifications & Alerts while Playing Favorite Games eScan 11 includes an advanced Game Detection feature that automatically detects the start of a game in full screen mode and prevents all eScan notifications and alerts from being displayed. You can thus enjoy an uninterrupted gaming experience. Prevent Memory Intensive Processes for Laptops eScan 11 includes the Laptop Mode feature that provides unmitigated battery time on laptops. Whenever you switch the Laptop Mode, eScan 11 automatically detects this change and prevents memory intensive processes like scheduled scans from running. eScan’s Real-time protection remains active while on Laptop Mode. Protection against Drive-by Malware Downloads eScan 11 includes a Malware URL filter that protects endpoints against Drive-by Malware downloads as socially engineered Malware attacks pose one of the largest risks to individuals and organizations. Access to malicious websites / URLs will be BLOCKED effectively providing to ZERO Day protection to computers. Advanced Classification of Ham and Spam E-Mails eScan 11 controls spam effectively by using Artificial Intelligence and sophisticated filters that work on the basis of specific keywords and phrases. This technology uses Artificial Intelligence to learn your behavior pattern and accordingly classifies e-mails as Ham (e-mails received by user) or Spam (e-mails quarantined for user). Comprehensive Digital Protection and Parental Control eScan 11 provides enhanced Web Protection and Privacy Protection features, such as User-based Parental Control, Pop-up Filter, and Virtual Keyboard. Parental Control and Pop-up Filters are customizable features that would help you block offensive content and Pop-ups, respectively. It also includes an advanced Web Phishing Filter that warns you of Phishing Websites and a Virtual Keyboard that protects your system against keyloggers. You can use this keyboard while typing sensitive information, such as banking passwords or credit card numbers. eScan 11 also includes an advanced Web Phishing Filter that warns you of Phishing Web Sites. It is also equipped with a Virtual Keyboard to protect your system against keyloggers. You can use this keyboard while typing sensitive information, such as banking passwords or credit card numbers. Comprehensive Protection against Network-based Attacks eScan 11 includes a set of predefined access control rules that you can customize as per your requirements. Firewall that has been enhanced for seamless integration with your operating system. In addition, it includes the Network Traffic Monitor that monitors incoming and outgoing network traffic. In also provides users with the option to block the execution of network-based executable files, thus preventing the spread of infections within networks. Extensive Asset Management for Complete System Administration eScan 11 helps to perform static asset management by using the System Information tool. This tool helps administrators obtain complete information about the hardware and software deployed on the computer and on the network. Prevent Data Theft and Virus Infections through USB Drives eScan 11 prevents data theft and Virus infections through USB and Fire-based devices. It includes the Application Control, which helps you to block or permit applications from running on networks and stand-alone computers. Lock Files and Folders that are very Critical and Confidential eScan 11 provides a new Folder Protection feature facility which helps you to protect specific files and folders from being modified or deleted. The main advantage of this feature is that it prevents the specified files from being infected by malicious software. Also, the files and folders that are protected cannot be deleted unless the folder protection is turned off. This helps you to safeguard your confidential data from infections due to malware. Eradicate Rootkits and File Infectors that cannot be Cleaned in the Normal Windows® Mode With eScan 11 you can create Windows®-based Rescue Disk files with the help of eScan Rescue File Creation wizard. The Rescue Disk file cleans Rootkits and File infectors from boot-infected computers that cannot be cleaned in the normal mode of the Windows® operating system. In addition, eScan 11’s product Installation CD comes with a set of installation setup files and bootable Rescue Disk. The bootable Rescue Disk enables you to clean boot the computer if the operating system fails to load on it. Automatically Checks & Downloads Critical Updates from the Microsoft® Web site eScan 11 automatically checks and downloads critical patches for the Windows® operating system from the Microsoft® Web site. It thus prevents malware from exploiting vulnerabilities, existing in your operating system. Automatically Provides Compressed Updates as per the Available Bandwidth eScan 11 continuously provides automatic compressed updates for the software and the virus and spam definitions. This protects your computer from the latest security threats. Comprehensive Reports for In-depth Analysis eScan 11 supports comprehensive reporting capabilities for all its modules, which you can use for in-depth analysis. Round-the-Clock Expert Support 24*7 FREE Online Technical Support (via e-mail, Live Chat, and Forums) is provided round the clock to all our customers. FREE Telephonic technical support is also provided through our offices during business hours.

25 Temmuz 2012 Çarşamba

Use Security Software That Updates Automatically

The bad guys constantly develop new ways to attack your computer, so your security software must be up-to-date to protect against the latest threats. Most security software can update automatically; set yours to do so. You can find free security software from well-known companies. Also, set your operating system and web browser to update automatically. If you let your operating system, web browser, or security software get out-of-date, criminals could sneak their bad programs – malware – onto your computer and use it to secretly break into other computers, send spam, or spy on your online activities. There are steps you can take to detect and get rid of malware. Don’t buy security software in response to unexpected pop-up messages or emails, especially messages that claim to have scanned your computer and found malware. Scammers send messages like these to try to get you to buy worthless software, or worse, to “break and enter” your computer.

7 Temmuz 2012 Cumartesi

Panda Cloud Antivirus

Panda Cloud Antivirus is Panda's successful attempt to jump on the free antivirus bandwagon. Along with MSE, it is an excellent choice for average users with a simple interface and completely automated features with automatic updating and removal of malware. The detection level is generally very high, but according to the latest test data, detection of zero day threats is slightly lower. PCA uses 'cloud' technology to provide for a much quicker release of updates as all definitions are stored in the cloud and thus the moment Panda updates their blacklist all users of PCA with an internet connection are protected from it. Panda Cloud Antivirus has a behavioural blocker and web protection, which will certainly increase your security. However as you can simply use one of the other free AV's with a separate behavioural blocker (for further details see our Security Wizard) to achieve possibly even better protection, this is not necessarily an advantage. One minor reservation I have is that PCA seems to erroneously detect certain browser/system-related applications, for example VideoCacheView, and because of the automatic quarantine this made it a fraction bothersome.

Microsoft Security Essentials

Microsoft Security Essentials is a favorite of mine with great detection rates, particularly for rootkits. Even more impressive is the fact that Microsoft Security Essentials has very few false positives, is light on resources and is good at removal of existing malware. MSE is a great choice for average users because of the minimal user interaction required. It automatically updates and removes threats. No registration is needed, apart from a quick validating of Windows, and there are no nag screens or advertisements. The main downsides are the slow scan speeds and the lengthy amount of time it takes to quarantine malware, though in my opinion these are rather trivial concerns, as for example a scan just be run overnight. MSE also is not available in certain countries so users there will have to look elsewhere. Note that Microsoft Security Essentials requires a genuine copy of Windows to install.