Wednesday, July 1, 2009

What has become of the Virus?

If you're new here, you can subscribe via RSS or Tecnoseguridad to receive news via email. Thanks for your visit!

These malicious programs have evolved to make a financial gain of the user and improved their camouflage

"We can not delegate any defense to the new operating systems," says Chema Alonso, a security consultant in the company Informatica64. For this specialist Trojans return represents "the greatest of threats." These are programs installed on your computer hidden and open a backdoor to communicate with the outside world with ill intentions. "The idea is that the malware does not want to infect and destroy your computer, now he wants to stay living with you to control your actions and use the equipment to convenience," he says. For example, such programs can find out what you type, and thus the user names and passwords for many services, with the risk, or may install malicious software without the user becomes aware. They can also use the computer as a spammer and better disguise the true location of "spammers".

Malware have evolved; before, usually requiring the user to activate the

Malware have evolved. Before, usually requiring the user to activate them. Resorted to ingenuity, which some call "social engineering" to the user naughty. Once the malware is executed, the virus could follow the routines that would have marked its programmer.

An extreme case of this ingenuity is applied to the scam "phishing." These are web sites or emails that are sent by simulating and replacing (even with their logos and email addresses) to an entity with which the user is dealing. So, as if the lottery scammers seeking coincidence. For example, a customer of a bank will receive an email allegedly ordered his body to enter his mind for some reason and pilgrims. In this situation, it is recommended not ever open an email from a bank, much less click a link within the email.

Entities only send in a few cases, provided with special security protocols and not to provide services or ads. You can send mails to alert that someone has paid money into account and little else. Therefore, it is preferable to access from the browser to the user's personal page on the bank and, once inside, to check whether there have been some communication.

No comments:

Post a Comment