Tag Archives: risks

Checkout Your Internet Risk Factor With OPSWAT’s Free Security Score

Not an imaginary conversation.

Me – How are you handling all the crazy new cyber threats currently being thrown at us on the Internet?

She – I’m cool! I’ve got the best Anti-virus program there is (her reference – the neighbourhood geek.)

Me – Good to hear that. So, what are you doing to take care of the rest?

She – What rest?

Rinse, wash and repeat this conversation a thousand times – and, the “rest” almost always becomes the new focus of attention. As it should – it’s here, in an often murky area (at least to a typical user), that, that user, runs a major risk of stumbling.

Security – both physical and electronic – isn’t about eliminating all risk – if it was, you and I (on the physical side), wouldn’t cross the road. Similarly, in Internet security, we can’t eliminate all the risks – short of unplugging the connection. Instead, a more realistic approach requires that we focus our attention on eliminating as many known risks as possible (just as we do in the physical world.)

In other words – we need to engage with the proactive side of Internet security rather than continuing to focus on the reactive side – the, “I’ve got the best Anti-virus program there is” side.

Luckily, there’s a terrific little application – OPSWAT’s Security Score – that in a matter of just a few seconds, evaluates and sets out the “rest” – and, should the application determine that a security issue needs to be addressed, helpful tips/hints are provided.

Regular readers may remember that I first reviewed this application several months ago, and while I agreed in principal with the concept, the execution (in my view), was not up to standard. OPSWAT has since revised and expanded the application in such a way, that Security Score should be considered a “must have” addition to a security toolbox. Particularly for those users who are less familiar with the ever changing cyber threat landscape.

Let me backtrack just a little and put up a graphic from the first run through with Security Score, in April. As you can see, the application teased out a score of 60/100. A less than impressive score for a security professional.

image

Good News:

The issues which prevented Security Score from digging into the system in order to provide an authentic result have been addressed and, are reflected in the following graphic – June 7, 2013.

image

The above graphic indicates an encryption raw score of zero which reflects the fact that I choose not to use Windows BitLocker.

However, as I wrote in my previous review – “I don’t do full disk encryption. I do however, encrypt selected files/folders (a much better choice for most users in my view), using what has long been considered the premier free encryption application available – TrueCrypt. Still, it’s good to see that the application addresses an issue which often escapes the notice of less experienced users.

image

Since application and operating system patches are often neglected by average users, a key component in Security Score measures the users adherence to a patch management routine.

image

Often not considered as part of a layered security approach, system/file backup is, in fact, a key element in any such process. You’ll note from the following graphic that Security Score has picked up on my use of a number of backup schemes including Google Drive…..

image

and Microsoft’s SkyDrive.

image

As the following graphic indicates, I’ve been marked down slightly on AV coverage since the application cannot be aware that I substitute full on-board AV scans with weekly scans using a Linux Live CD.

image

Given the conditions that we are now forced to deal with on the Internet – active PC monitoring with a view to insuring the security status of the machine is in good order is not just a preference or a recommendation – it’s an absolute necessity.

Sure, you can do all that this application does, manually. Choosing this route however, one could increase the risk of possible shortcomings in an otherwise acceptable security strategy. So, do yourself a favor and install OPSWAT’s Security Score. Better yet, introduce your friends/relatives/co-workers, to this neat freebie – we’ll all be the better for that.

Download at: OPSWAT

How OPSWAT calculates your security score:

OPSWAT’s score calculation is based on security industry and market research reports, over ten years of expertise in the security field, and feedback from leading security technology vendors on the relative importance of the categories and status of security software.

18 Comments

Filed under Anti-Malware Tools, Freeware, OPSWAT

WARNING! You Are Now Connected To The Internet!

imageAny organization which provides services that expose the end user to risks – physical risks, financial risks, health risks………. expects that the user will assume the reasonable risks associated with the consumption of the service.

You can be sure, if you go on an African safari you will be required to assume the risk of being eaten by a Lion – ouch! If you venture on a mountain climbing vacation – you will have to assume all the risks associated with this type of activity – including the risk of personal injury, and even death.

image

In both of these extreme examples, you will be required to demonstrate that you are aware of the risks, and accept and fully assume those risks, and hazards, associated with the activity.

In order to protect its interests, the service provider will demand that you sign a liability waiver designed to mitigate its responsibility in all but the most egregious of circumstances.

This is a two-fold practical warning solution .

It ensures that the consumer has considered the risks, and found those risks tolerable.

It offers protection to the service provider in the event, the consumer behaves outside common sense boundaries.

Why then, I wonder – given the constantly deteriorating state of Internet security, and the privacy, financial, and assorted other risks that a typical users is expected to assume (users who are largely unaware of the assumed risks) – Internet service providers have not considered the appropriateness of providing a “WARNING! You Are Now Connected To The Internet!” notice to consumers on Browser launch. No waiver of liability required – just a constructive warning.

Such a notice, might offer practical advice such as the following – but certainly not necessarily limited to these innocuous tidbits.

Users should be aware that the Internet is not a secure medium and that third parties may be able to obtain information regarding users’ activities.

The validity or accuracy of information found on the Internet should be considered with caution.

Some resources and destinations may contain material that you might find offensive, or inappropriate.

Software downloaded from the Internet may contain malware.

I have no doubt that Internet service providers could make a persuasive argument as to why they don’t have an obligation to educate consumers on the very real risks associated with the use of their service. But, in my view, there are fundamental considerations over and above a – “they don’t have an obligation” mindset.

Just one consideration –

Lack of consumer security awareness has led to the creation of a cyber crime industry – and, there’s little doubt that it is an industry – which is responsible for the theft of $388 billion globally (Norton Cybercrime Report 2011), in the past year, alone.

Additional information from the Norton Cybercrime Report:

Every day of the past year, over 1 million online adults in 24 countries experienced cybercrime.    This can also be broken down to 50,000  victims per hour, 820  victims per minute, or 14 victims every second.  In just the last 12 months 44% of people have been a victim of cybercrime while only 15% have been a victim of physical crime in the same period.

Norton emphasizes the point (made here many, many times), that cyber crime can be largely prevented if – good security practices (which includes patched operating systems and applications), are followed.

All well and good – provided, consumers are regularly reminded of the Internet risks they face. It’s my view, that Internet service providers can do much more to raise an awareness of these risks.

It may be a pipedream when I think that ISPs should consider their moral obligation in this matter – still, I can’t help but think out loud.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

15 Comments

Filed under Opinion, Point of View

Run Splashtop, A Free Web Centric OS To Reduce Your Exposure To Malware

imageCurrent statistics indicate that over 95 percent of viruses, spyware, and other types of malware, are designed and targeted to attack Microsoft Windows. And, the route by which the majority of malware spreads, and intrusion attempts take place is the Internet Browser.

It seems reasonable to make the point then, that if you’re not running Windows while surfing the Net, but instead, you’re running an alternative operating system, you shouldn’t have to unnecessarily worry about malware, viruses, and spyware.

Regular readers might recall that I do most of my surfing using Linux; specifically Ubuntu. And yes, I’m aware of of all the counter arguments that surround this choice – “security through obscurity”, “Linux is built from the ground up with security in mind”, and on and on.

None of the various contentious points of view really make much difference to me. The reality is straightforward – all statistics indicate that surfing with a non-Windows system can reduce the malware risks Windows users have to contend with.

If you are leaning towards running an alternative to Windows, while interacting with the Net, then Splashtop OS, a Linux driven Web centric, (Chrome focused), specialty operating system (which coexists with Windows),  and is close to “instant on”, – about 10 seconds to boot and reach the Net in my tests, is worth taking for a spin.

Splashtop, (in beta currently), was initially designed to run on specific HP systems only, but it can now run on virtually any Windows system. Following installation, (from within Windows), on subsequent boots you will have the opportunity to boot into Splashtop, or Windows, through a boot menu.

Booting back into Windows once you’re in Splashtop, is “one click” simple.

You won’t get lost during the install which is very straightforward.

image

On completion of the install process, you will have an opportunity to gather additional information.

image

and perform a number of setup tasks.

image

The desktop is rather plain, but given that Splashtop has been designed as a Web centric OS, it’s still very functional.

image

Fast facts:

FAST:  Starts in seconds — way before Windows

EASY:  Featuring Instant Search, powered by Bing

SAFE:  A Linux-based platform running Chromium

READY:  Includes Adobe Flash Player pre-installed

PERSONAL:  Choose from thousands of Web Apps, extensions, and themes at the Chrome Web Store, and install the ones you want

SIMPLE:  Your existing Windows bookmarks and Wi-Fi Settings profile can be imported from Windows into Splashtop OS

CONVENIENT:  Visual Bookmarks show thumbnails of recently visited web pages (or can be hidden if desired)

CUSTOMIZABLE:  From the Status Bar, check the status of network connections, volume, power supply; or open the Configuration Panel and then set your preferences

FLEXIBLE:  If desired, you can exit Splashtop OS and boot to the Windows OS at any time

Running Splashtop will allow you to surf, and interact with the Internet as you normally would – including interacting with instant messaging, email, music, photos, documents, gaming, etc. And, it really is virtually “instant on”.

Additional details available at the developer’s site:

Using features of the Web Browser

Using the Splashtop OS Configuration Utility in Windows

Using the Boot Menu (unsupported computers only)

Announcements and Frequently Asked Questions

More information at the Splashtop OS web page

Download at: Splashtop

21 Comments

Filed under Alternatives to Windows, Beta Software, Chrome, Don't Get Hacked, downloads, Freeware, Google Chrome, Interconnectivity, Internet Safety Tools, Linux, Operating Systems, Software, System Security, Windows Tips and Tools

LimeWire Is Dead – Long Live FrostWire!

If you visit the official LimeWire website, you will, no doubt, be surprised to see the following message –  “This is an official notice that LimeWire is under a court-ordered injunction to stop distributing and supporting its file-sharing software. Downloading or sharing copyrighted content without authorization is illegal.”

The Recording Industry Association of America which represents the recording industry distributors in the United States, has struck once again in its aggressive battle to combat what it defines as copyright infringement. While I’m not a supporter of copyright infringement, I do consider RIIA’s tactics not far removed from those that were once employed by the Spanish Inquisition. Heavy handed – to say the least.

image

Unfortunately, if you were a LimeWire user you’ve noticed that searching, downloading, uploading, file sharing and so on, are no longer available. But, don’t despair – there are other solutions. Maybe now is the time to take a close look at a LimeWire alternative – FrostWire.

FrostWire (newest version: 4.21), released September 29, 2010, is a free, open source Peer to Peer application which incorporates all of the now dead LimeWire’s functionality, as well as a number of the features of the old LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections.

To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

image

Fast facts:

Open-source

Firewall-to-firewall transfers

Built-in community chat

Connects to more sources

Creative commons license support

Broadband network connection

Junk result filters

Turbo-Charged download speeds

iTunes integration

Gnutella support

BitTorrent support

Proxy Support

If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs. With almost 30 Million downloads on CNET alone, calling this application “very popular” is a bit of an understatement.

System requirements: Windows 7, Windows 2000, Windows Vista, Windows NT, Windows XP, Mac OS X 10.5 or later, Linux, Unix such as Solaris.

Additional requirements: Java Runtime Environment 1.6

Download at: FrostWire.com

Note: Consider the trade-offs, and the very real risks involved in Peer to Peer file sharing.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, (Susan Naulls), and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, FrostWire, Interconnectivity, Open Source, Peer to Peer, Software, Ubuntu, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

ThreatFire Version 4.7.0 – Free Protection Against Zero Day Malware

So here’s the question.

If 52 percent of the nearly 40,000 samples of new viruses, worms, Trojans and other types of Internet threats identified every day, only last 24 hours, how do security applications that rely on a definition database to identify malware files (most anti-malware applications), keep up with this onslaught?

The simple answer is; they don’t.

The relentless evolution of these increasingly more powerful, and destructive attacks, against computer systems, has disclosed a gaping hole; a vulnerability to zero-day threats in many users’ Internet security defenses.

Zero-day threats are those that are defined as malware that has been written and distributed to take advantage of system vulnerabilities, before security developers can create, and release, counter measures.

So where does this leave you?

Without tools that will identify and eliminate these malware threats, you run the risk of infection by these constantly evolving zero day security risks to our computers, and operating systems.

One such free, powerful tool, reviewed here previously, is ThreatFire from PC Tools – the developers of the highly regarded PC Tools Internet Security 2010, which blocks malware (including zero-day threats) by analyzing program behavior (if it looks like a crook, and acts like a crook, it’s probably a crook), instead of relying only on a signature based database.

ThreatFire works together with your signature based security applications, to increase the effectiveness of your total security arsenal.

clip_image003

When ThreatFire detects a behavior based threat, it goes into analysis overdrive by comparing the threat against its signature database; those threats that are recognized by the database are quarantined immediately.

clip_image004

Unrecognized threats, or unrecognized behaviors, are assigned a calculated risk level (set by the user), at which point the user has the option of confirming, or blocking, the action.

A good example of the effectiveness of this application was made clear to me, recently, while I was checking all of the ports on my home Windows machine. ThreatFire immediately advised me that the Port Checker was attempting to send email from port 25.

Of course it actually wasn’t, it was simply opening it for testing purposes. But if this port was being opened, and was being used by malware, ThreatFire would have identified this danger by its behavior, and given me the necessary warning.

clip_image005

The following chart gives a good indication of how ThreatFire can supplement your existing security applications. (Chart courtesy of ThreatFire)

ThreatFire Chart

Fast facts:

Persistent zero-day threat protection made easy for every one – even novice users!

Displays detailed data on all running processes and allows you to terminate any process on demand.

Malware quarantine and removal, rootkit scanner, advanced custom rules settings and more!

Patent-pending ActiveDefense technology intelligently scans and analyzes computer processes to detect and block any malicious activity – without false positives!

Runs in background without impacting system performance.

Highest level of out-of-the-box accuracy. No need to configure baffling, technical security settings: just turn ThreatFire on and start blocking malware.

Perpetually ready for the next malware outbreak – detects malware by watching for malicious behaviors.

Enhanced user interface elements provide more technical details on alerts and interactive reports in ThreatFire’s main control panel.

Automatic updates run silently in the background so ThreatFire is always up-to-date.

Protects against viruses, worms, Trojans, spyware, keyloggers, buffer overflows, and rootkits – even if the threats are brand new and have never been seen before.

Works alongside your other security programs – in most cases you can use ThreatFire with your other antivirus, anti-spyware, firewall or other security programs.

If you read “An Anti-malware Test – Common Sense Wins”, on this site, you’ll note that during this one year test, ThreatFire was a primary security component on the test machine. In fact, each of my home machines is protected against infection by ThreatFire.

I highly recommend ThreatFire as a critical component in your overall Internet security toolbox.

System Requirements: Windows 7 32-bit and 64-bit, Windows Vista 64-bit, Vista 32-bit, Windows XP SP1, SP2 or SP3 (Home, Pro & Media Center Editions), Windows 2003, Windows 2008.

Download at: ThreatFire

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

21 Comments

Filed under Anti-Malware Tools, Don't Get Scammed, Don't Get Hacked, downloads, Free Security Programs, Freeware, Internet Safety Tools, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Do We Need to “Fix” the Internet?

Each time that you connect to the Internet you are unfortunately, wandering through a raucous neighborhood which has a reputation for being jam-packed with predators.

These predators are intent on stealing your money and personal information, installing damaging programs on your computer, or misleading you with an online scam.

Cyber-crooks are relentless in their pursuit of your money, and it’s all about the money. In the worst case scenario, your identity and your financial security can be severely compromised.

Recently, Symantec reported that 51% of all the viruses, Trojans and other forms of malware it has ever seen were logged during 2009, and Symantec has been in the security business since before the Internet was launched.

Each day, when I boot up my home machine, Immunet Protect, advises me that it is protecting me against 12 Million threats. Today for example (May 16, 2010, the number is 12,866,263. That number is truly mind blowing.

Note: Later in the day, following a re-boot, I noticed that the protection level had risen to 12,876,095 – 10,000 additional threats had been identified.

Various Internet security companies report having to deal with up to as many as 40,000 new versions of malware daily. Here’s the math; one new malware program every four seconds!

Anti malware developer Comodo, looks at these numbers in a way that we can more easily relate to, in its instructive video – Did you Know? Dangers on the Web.

“Did you know that the amount of new malware discovered daily approximates the number of words a person speaks daily?

Or, the amount of money lost by US Consumers due to malware over the past 2 years would have paid the tuition of over one million US College Students?”

Seen in this way, cybercrime takes on a whole new dimension.

Since additional sophisticated threats are constantly being developed, or are currently being deployed, some observers are of the opinion that the Internet is essentially broken.

If you think this is an exaggeration, check this out and then you decide.

Tainted search engine results: Internet security gurus have known for some time that we cannot rely on Internet search engine output to be untainted, and free of potential harmful exposure to malware.

Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines.

When a potential victim visits one of these sites, the chances of downloading malicious code onto the computer by exploiting existing vulnerabilities, is extremely high.

Infected legitimate websites: According to security solution provider  Kaspersky, the rate of infected legitimate web sites, in 2006, was one in every 20,000. In 2009, one in every 150 legitimate was infected by malware, according to Kaspersky.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common and craftier recently.

If you’re unfamiliar with the term, drive-by download, they are essentially programs that automatically download and install on your computer without your knowledge.

This action can occur while visiting an infected web site, opening an infected HTML email, or by clicking on a deceptive popup window. Often, more than one program is downloaded; for example, file sharing with tracking spyware is very common. It’s important to remember that this can take place without warning, or your approval.

Rogue software: A rogue security application (scareware), is an application usually found on free download and adult websites, or it can be installed from rogue security software websites, using Trojans or, manipulating Internet browser security holes.

After the installation of rogue security software the program launches fake or false malware detection warnings. Rogue security applications, and there seems to be an epidemic of them on the Internet currently, are developed to mislead uninformed computer users’ into downloading and paying for the “full” version of this bogus software, based on the false malware positives generated by the application.

Even if the full program fee is paid, rogue software continues to run as a background process incessantly reporting those fake or false malware detection warnings. Over time, this type of software will essentially destroy the victim’s computer operating system, making the machine unusable.

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity. The fact is, we are all pretty curious creatures and let’s face it, who doesn’t like surprise emails? I think it’s safe to say, we all love to receive good news emails.

It seems that more and more these days, I get phishing emails in my inboxes all designed to trick me into revealing financial information that can be used to steal my money.

If you’re unfamiliar with phishing, it is defined as the act of tricking unsuspecting Internet users into revealing sensitive or private information. In a phishing attack, the attacker creates a set of circumstances where the potential victims are convinced that they are dealing with an authorized party. It relies for its success on the principle that asking a large number of people for this information, will always deceive at least some of those people.

A personal example of how this works is as follows. According to a recent email (similar in form and content to 20+ I receive each month), my online banking privileges with Bank of America had been blocked due to security concerns. This looked like an official email and the enclosed link made it simple to get this problem solved with just a mouse click. What could be easier than that?

Clicking on the link would have redirected me to a spoof page, comparable to the original site, and I would then have begun the process whereby the scammers would have stripped me of all the confidential information I was willing to provide.

My financial and personal details, had I entered them, would then have been harvested by the cyber-crooks behind this fraudulent scheme who would then have used this information to commit identity and financial theft.

These types of attacks against financial institutions, and consumers, are occurring with such frequency that the IC³ (Internet Crime Complaint Center), has called the situation “alarming”, so you need to be extremely vigilant.

This is by no means an exhaustive list of the dangers we are exposed to on the Internet. There are many more technical reasons why the Internet is becoming progressively more dangerous which are outside the scope of this article.

So what do you think? Is the Internet broken – do we need to fix it, and if so, how can we do that?

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

20 Comments

Filed under Comodo, cybercrime, Don't Get Scammed, Don't Get Hacked, Internet Safety, internet scams, Internet Security Alerts, Malware Advisories, Online Safety, Phishing, Rogue Software, spam, Symantec, trojans, Viruses, Windows Tips and Tools, worms

Free ThreatFire – Advanced Security Against Malware

So here’s the question.

If 52 percent of the nearly 40,000 samples of new viruses, worms, Trojans and other types of Internet threats identified every day, only last 24 hours, how do security applications that rely on a definition database to identify malware files (most anti-malware applications), keep up with this onslaught?

The simple answer is; they don’t.

The relentless evolution of these increasingly more powerful, and destructive attacks, against computer systems, has disclosed a gaping hole; a vulnerability to zero-day threats in many users’ Internet security defenses.

Zero-day threats are those that are defined as malware that has been written and distributed to take advantage of system vulnerabilities, before security developers can create, and release, counter measures.

So where does this leave you and me?

Without tools that will identify and eliminate these malware threats, we (you and I), run the risk of infection by these constantly evolving zero day security risks to our computers, and operating systems.

One such free, powerful tool, reviewed here previously, is ThreatFire from PC Tools – the developers of the highly regarded PC Tools Internet Security 2010, which blocks malware (including zero-day threats) by analyzing program behavior (heuristics), instead of relying only on a signature based database.

ThreatFire works together with your signature based security applications, to increase the effectiveness of your total security arsenal.

clip_image003

When ThreatFire detects a behavior based threat, it goes into analysis overdrive by comparing the threat against its signature database; those threats that are recognized by the database are quarantined immediately.

clip_image004

Unrecognized threats, or unrecognized behaviors, are assigned a calculated risk level (set by the user), at which point the user has the option of confirming, or blocking, the action.

A good example of the effectiveness of this application was made clear to me, recently, while I was checking all of the ports on my home Windows machine. ThreatFire immediately advised me that the Port Checker was attempting to send email from port 25.

Of course it actually wasn’t, it was simply opening it for testing purposes. But if this port was being opened, and was being used by malware, ThreatFire would have identified this danger by its behavior, and given me the necessary warning.

clip_image005

The following chart gives a good indication of how ThreatFire can supplement your existing security applications. (Chart courtesy of ThreatFire)

ThreatFire Chart

Fast facts:

Immediately Effective with No Complicated Set Up

Proactive Defense against Both Known and Unknown Threats

PC Tools AntiVirus Included for On-demand Scanning

Quarantine and Permanently Remove Threats from Your System

Rootkit Scanner Seeks Out Deeply Hidden Files, Objects and Registry Keys

View Detailed Process Information on All Running Processes

Complementary to Your Existing Antivirus Software

Advanced Custom Configuration Options and Rules Settings

Virtually No Impact on System Performance

More Technical Details Provided on Alerts

Continually Improving Protection Technology

Free email and web-based technical support

If you read “An Anti-malware Test – Common Sense Wins”, on this site, you’ll note that during this one year test, ThreatFire was a primary security component on the test machine. In fact, each of my home machines is protected against infection by ThreatFire.

I highly recommend ThreatFire as a critical component in your overall Internet security toolbox.

System Requirements: Windows 7 32-bit and 64-bit, Windows Vista 64-bit, Vista 32-bit, Windows XP SP1, SP2 or SP3 (Home, Pro & Media Center Editions), Windows 2003, Windows 2008.

Download at: ThreatFire

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

25 Comments

Filed under Anti-Malware Tools, Don't Get Scammed, Don't Get Hacked, downloads, Free Security Programs, Freeware, Online Safety, PC Tools, Software, Spyware - Adware Protection, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

If it’s in the News – Watch for an Email Scam

image If an event is newsworthy, you can be sure cybercriminals are exploiting it to their own advantage. Cybercriminals have jumped (as expected), on the earthquake tragedy in Haiti, and are already exploiting this sad event.

Cybercriminals are experts at exploiting our curiosity surrounding current events, and by focusing on this aspect of social engineering, they are increasingly creating opportunities designed to drop malicious code on our computers. Most of this activity is designed to separate unwitting victims from their money.

Cybercriminals can be much more direct though (without attempting to compromise your computer), in their attempts to separate you from your money.

Even though the the majority of seasoned computer users (I suspect), are familiar with the infamous “419” or advance fee fraud scam, in which the victim is encouraged to sent money to the scammer, with the promise they will realize a significant gain, this type of scam is every bit as popular as ever.

Earlier today, Symantec Hosted Services alerted me to a new “419” scam they have just become aware of. An email claiming to be from Hassan Ali Abdul Mutallab, the brother of Umar Farouk Abdul Mutallab, who allegedly attempted to blow up Northwest Airlines flight 253 over Detroit on Christmas Day, is the scam vehicle .

image

The scammer, supposedly Umar Farouk Abdul Mutallab’s brother, claims he is looking for a “Muslim brother/sister” to help retrieve funds belonging to the alleged bomber. But, as Symantec  stated in their alert, “before the non-existent money can be released, various increasingly inventive fees and charges have to be paid. These fees continue until the victim of the scam eventually realizes that they have no chance of getting any money, and gives up. Victims are often too embarrassed to contact police, and the scammers continue”.

Every day, I receive 10/15 of this type of scam in my “Honey Pot” email account. Here’s just one example from today.

Honey pot

How gullible can people be? When Michael Jackson died, I wrote a piece entitled “Hey Sucker – Read This! Michael Jackson’s Not Dead!”, simply as a test of “curiosity exploitation”.

The results that followed were astonishing – within days, this article was getting 1,000’s of daily hits. Even today, this nonsensical article continues to get hits. Talk about gullible people!

Save yourself from being victimized by scareware, or other malware, and review the following actions you can take to protect your Internet connected computer system:

    • When surfing the web – Stop. Think. Click
    • Install an Internet Browser add-on such as WOT (my personal favorite), which provides detailed test results on a site’s safety; protecting you from security threats including spyware, adware, spam, viruses, browser exploits, and online scams.
    • Don’t open unknown email attachments
    • Don’t run programs of unknown origin
    • Disable hidden filename extensions
    • Keep all applications (including your operating system) patched
    • Turn off your computer or disconnect from the network when not in use
    • Disable Java, JavaScript, and ActiveX if possible
    • Disable scripting features in email programs
    • Make regular backups of critical data
    • Make a boot disk in case your computer is damaged or compromised
    • Turn off file and printer sharing on your computer.
    • Install a personal firewall on your computer.
    • Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.
    • Ensure the anti-virus software scans all e-mail attachments.

    If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

    4 Comments

    Filed under Don't Get Scammed, Don't Get Hacked, email scams, internet scams, Internet Security Alerts, Symantec, Windows Tips and Tools

    Free FrostWire P2P – Not Just LimeWire Pro in Disguise

    imageFrostWire (newest version: 4.18.5), released December 11, 2009, is a free, open source Peer to Peer application.

    To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

    FrostWire includes all of the free LimeWire version’s functionality as well as a number of the features of LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections. An added benefit in using FrostWire; you won’t have to put up with LimeWire’s nag screen or ads.

    image

    Fast facts:

    · Open-source

    · Firewall-to-firewall transfers

    · Built-in community chat

    · Connects to more sources

    · Creative commons license support

    · Broadband network connection

    · Junk result filters

    · Turbo-Charged download speeds

    · iTunes integration

    · Gnutella support

    · BitTorrent support

    · Proxy Support

    If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs.

    With over 26 Million downloads on CNET alone (200,000 in the past week), calling this application “very popular” is a bit of an understatement.

    System requirements: Windows Me/2000/XP/Vista/7

    Additional requirements: Java Runtime Environment 1.6

    Download at: Download.com

    If P2P file sharing is one of your interests then you should consider the trade-offs and the very real risks involved in Peer to Peer file sharing.

    Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

    If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

    It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

    Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

    Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

    Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

    Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

    I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

    Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

    Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

    Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

    What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

    If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

    9 Comments

    Filed under Don't Get Scammed, Don't Get Hacked, downloads, Freeware, Interconnectivity, Networking, Peer to Peer, Software, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

    Peer to Peer File Sharing, Very Cool But…

    You should consider the trade-offs and the very real risks involved in Peer to Peer file sharing.

    Peer to Peer file sharing sounds promising, right? Maybe, but make sure that you consider the trade-offs and the very real risks involved. The number of times I have been called upon to rescue a friend’s computer because of system damage caused by peer to peer downloading, has convinced me to give this form of file sharing an automatic “thumbs down”.

    Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

    If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

    It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

    Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

    Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

    Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

    Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

    I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

    Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

    Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

    Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

    What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

    If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

    1 Comment

    Filed under Don't Get Scammed, Don't Get Hacked, Internet Safety, Online Safety, Peer to Peer, Windows Tips and Tools