Tag Archives: security applications

Is Windows XP Dead? Not According To OPSWAT’s June 2011 Quarterly Report

imageTo quote Mark Twain, “The rumors of my death have been greatly exaggerated.” I suspect, if Windows XP were capable of speech, we just might hear the same observation repeated regarding its own demise.

Sure, Windows XP no longer holds the overwhelming market share it once held – which, according to Computerworld, reached a high of  83.6% of all operating systems in November 2007. But, statistics in OPSWAT’s latest quarterly report, to be released today, might surprise those pundits who frequently pontificate that XP is dead – dead – dead. We’ll, it just isn’t so!

There’s little doubt of course, that XP will eventually disappear from the scene – but, not quite yet. In the meantime, according to OPSWAT, XP continues to hold a better than 50% worldwide operating system market share at 55.84%, followed by Windows 7 at 38.81%. Vista trails the pack, with a dismal showing of 4.72%.

BTW, I’m not here to dispute the fact that Windows 7 is considerably safer overall than XP – that would be simply ludicrous. But, it’s equally as ludicrous to ignore the fact (as so many self described “experts” do), that XP continues to command a huge market share. 

image

Graphic courtesy OPSWAT

Additionally, the OPSWAT’s report takes a close look at Worldwide and North American Antivirus vendors market share and, the gathered information may hold some surprises for those who assume that the security application marketplace is controlled by a select few major developers.

The following graphic reflects North American market penetration only. Worldwide statistics are available in the full report.

image

Graphic courtesy OPSWAT

Report methodology: Usage data for security applications on Windows systems.

The data was collected using OPSWAT’s AppRemover and Am I OESIS OK? tools, which utilize the detection capabilities of the OESIS Framework to collect information regarding the applications installed on endpoint computers.

More than 43,000 data points were compiled for this report.

The full report which is chock fill of absorbing statistics is available here.

So, who is OPSWAT? 

If you’re a techie then you’re very likely familiar with AppRemover, a free powerful anti-malware, antivirus application remover from OPSWAT. Beyond this direct connection however, you might not be familiar with OPSWAT.

From the site:

OPSWAT is the industry leader in software management SDKs, interoperability certification and multiple-engine scanning solutions. Our solutions are simplified and comprehensive, solving complex development problems to reduce time and costs for your engineering and testing teams.

OPSWAT offers software manageability solutions to streamline technology partnerships between leading technology solutions and software vendors. By enabling seamless compatibility and easy management capabilities, we make connecting your solutions with other software applications effortless.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Freeware, OPSWAT, Reports, Windows 7, Windows XP

Scareware Is Everywhere – As Mac Users Just Found Out

The success cyber criminals have had with the recent Mac scareware attack (MacDefender, which has already morphed into a new variant – MacGuard), emphasizes the following point – given the opportunity, Mac users may be just as likely as Windows users to say “Yes” to an invitation to download a rogue security application.

Considering Apple’s marketing style, which reinforces the myth that Macs are inherently more resistant to malware infections than Windows PCs (bolstered by the cachet that Mac users are somehow smarter than PC users), I suspect that Mac users are in for a rough ride in the coming months. Undoubtedly, Mac users will learn that cyber criminals use of social engineering is not platform specific.

Hopefully, this reality check will put a stop to nonsensical forum comments like the following.

“Well this is why I’m glad to have a Mac just saying”

“If Windows didn’t exist these things wouldn’t happen to people”

Since myths tend to die a slow and painful death however, I somehow doubt it.

Early last year, I posted an article – Say “Yes” on the Internet and Malware’s Gotcha! – which pointed out the potential consequences to those Internet users who instinctively, and unthinkingly, click on “Yes” or “OK”. Given the unprecedented rise in the number of malicious scareware applications in the interim (often, but not exclusively, promoted through poisoned Google search results), that article is worth reposting.

The following is an edited version of that earlier article.

It's not my fault Virtually every computer user, at both the home user level (my friends), and at the corporate level, whom I come into contact with, tends to downplay personal responsibility for a malware infection.

I hear a lot of – “I don’t know what happened”; “it must have been one of the kids”; “all I did was download a free app that told me I was infected”; “no, I never visit porn sites” or, Bart Simpson’s famous line “it wasn’t me”. Sort of like “the dog ate my homework”, response. But we old timers, (sorry, seasoned pros), know the reality is somewhat different, and here’s why.

Cybercriminals overwhelmingly rely on social engineering to create an opportunity designed to drop malicious code, including rootkits, password stealers, Trojan horses, and spam bots, on Internet connected computers.

In other words, cybercriminals rely on the user/potential victim saying – “YES”.

Yes to:

Downloading that security app that told you your machine was infected. Thereby, infecting your computer with a rogue security application.

Opening that email attachment despite the fact it has a .exe .vbs, or .lnk.extension, virtually guaranteeing an infection.

Downloading that media player codec to play a  porno clip, which still won’t play, but your computer is now infected.

Clicking on links in instant messaging (IM) that have no context, or are composed of only general text, which will result in your computer becoming part of a botnet.

Downloading executable software from web sites without ensuring that the site is reputable. Software that may contain a Browser Hijacker as part of the payload.

Opening email attachments from people you don’t know. At a minimum, you will now get inundated with Spam mail which will increase the changes of a malware infection.

There are many more opportunities for you to say “yes”, while connected to the Internet, but those listed above are some of the the most common.

The Internet is full of traps for the unwary – that’s a sad fact, and that’s not going to change any time soon. Cyber criminals are winning this game, and unless you learn to say “NO”, it’s only a matter of time until you have to deal with a malware infected machine.

Here’s an example of a rogue security application getting ready to pounce. A progressively more common occurrence on the Internet.

image

image

I can’t say this often enough. Ensure you have adequate knowledge to protect yourself and stay ahead of the cybercrime curve. Make a commitment to acquire the knowledge necessary to ensure your personal safety on the Internet. In a word, become  “educated”.

If you lack this knowledge the answer is simple – you can get it. The Internet is loaded with sites (including this one), dedicated to educating computer users on computer security – including providing application reviews, and links to appropriate security software solutions.

It’s important to be aware however, that security applications alone, will not ensure your safety on the Internet. You really do need to become proactive to your Internet safety and security. And that does mean becoming educated.

Internet users who are aware of significant changes in the Internet security landscape, will react accordingly. Unfortunately, experience has taught me that you can’t fix stupid.

Before you say “yes”

Stop – consider where you’re action might lead

Think – consider the consequences to your security

Click – only after making an educated decision to proceed

Consider this from Robert Brault:

“The ultimate folly is to think that something crucial to your welfare is being taken care of for you”.

I’ll put it more bluntly – If you get a malware infection; it’s virtually certain it’s your fault. You might think – here’s this smug, cynical guy, sitting in his office, pointing undeserved critical fingers. Don’t believe it.

If users followed advice posted here, and advice from other security pros, and high level users, the Internet could be a vastly different experience for many. At the very least, we might have half a chance of dealing more effectively with the cybercriminal element. To this point, we’re losing rather magnificently.

Computer users would be vastly better off if they considered Internet security advice, as a form of inoculation. It’s a relatively painless way to develop immunization. While inoculations can be mildly painful, the alternative can be a very painful experience.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Cyber Crime, Cyber Criminals, cybercrime, Don't Get Scammed, Don't Get Hacked, Internet Safety, internet scams, Mac, Malware Alert, Online Safety, Rogue Software, Safe Surfing, scareware, Windows Tips and Tools

OPSWAT’s Latest Quarterly Report Breaks Down Antivirus Market Share, Windows Usage By Version, And More

imageIf you’re a techie then you’re very likely familiar with AppRemover, a free powerful anti-malware, antivirus application remover from OPSWAT. Beyond this direct connection however, you might not be familiar with OPSWAT.

So, who are OPSWAT, and what do they do?

From the site:

OPSWAT offers software manageability solutions to streamline technology partnerships between leading technology solutions and software vendors. By enabling seamless compatibility and easy management capabilities, we make connecting your solutions with other software applications effortless.

As a Blogger, information gatherer, and distributor, there is an additional area of OPSWAT’s expertise that I find invaluable, and that is – the regular reports which the company releases on vendor market share for antivirus, hard disk encryption, backup clients, and peer to peer applications.

In its latest quarterly report, (to be released later today), OPSWAT has focused on Worldwide and North American Antivirus vendors market share, with additional data breaking down Windows usage by version and, bonus data on Peer to Peer application usage.

Here’s a few teasers from this report:

The avast! Antivirus product line has helped AVAST Soware maintain its position as the top antivirus vendor worldwide for the last two quarters, despite a slight drop to 16.19% global market share in this report.

Avira GmbH and AVG Technologies are second and third in global market share with 13.22% and 11.47% respectively. In comparison to the worldwide data from our December 2010 report, Avira GmbH shows a considerable increase of 4.96%, which could result from a higher percentage of the current data originating from countries where they have a stronger hold on the market.

The only other worldwide market share increases were by AVG, with a 1.76% gain from the December report, Lavaso, with a 0.82% rise, and Comodo, with a minimal increase of 0.06%.

Worldwide Antivirus Market Share

image

Graphic courtesy OPSWAT

North American Antivirus Market Share

image

Graphic courtesy OPSWAT

The following graphic might hold some surprises for those who insist that Windows XP is dead. If you were to Google “Windows XP is dead”, for example, you might be surprised to see 25 Million search results.

I’m continuously amazed at the gullibility of consumers, particularly here in North America, who are so easily convinced to discard workable solutions in favor of “the latest and greatest”.

As one who continues to happily run Windows XP on an older machine, I must admit to a certain sense of satisfaction when more than half of Worldwide users continue to resist Microsoft’s planned obsolescence cycle.

And yes, I’m quite familiar with the so called “security issues” inherent in running XP. What I find curious is – on the one hand we (those of us involved in system security), extoll users to develop situational awareness while on the Internet, while on the other hand, there’s a tendency to lay the blame for system intrusion based, in large part, on older operating system deficiencies. Marketing gone mad, anyone?

Windows OS Usage – by Version

Click on the graphic to expand to original.

image

Graphic courtesy OPSWAT

P2P Application Market Share

image

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Anti-Malware Tools, Myths, Opinion, Peer to Peer, Point of View, Reports, Software, Windows Tips and Tools

How Popular Worldwide Is YOUR AV Application?

imageA regular reader recently made the point that certain web sites (which are recognized for software reviews), tend to focus on the most popular security applications, seemingly at the expense of security applications that are less well known.

He has a point, I think – visiting some review sites might lead you to believe that the security application marketplace is controlled by a select few major developers. So, is that really the case?

A report released in December 2010, by OPSWAT, which includes data on both worldwide, and North American market share and usage data for antivirus software, might surprise you.

Here’s a few teasers from this report:

The avast! Antivirus product line has helped AVAST Software maintain the title of number one antivirus vendor worldwide with 17.53% global market share. ESET Software and Symantec round out the top three in global market share with 12.05% and 10.04% respectively.

In North America, fifty-three different antivirus companies were detected in this report. Of those fifty-three, five companies combined to control 60.74% of the antivirus market.

While Symantec still controls a large part of the market, trends are moving away from paid antivirus software and towards free antivirus solutions such as those from Microsoft, AVG, and AVAST Software.

Our current data shows that 58% of respondents were using a free solution, confirming our trend noted above when compared to a 42% free solution share as shown in our June 2010 report.

Microsoft’s Security Essentials Antivirus leads the North American Market for individual products with 10% market share, a 2.5% increase since our September 2010 report.

“Free” antivirus solutions also accounted for 3 of the top 4 antivirus products detected globally, as avast! Free Antivirus, Microsoft Security Essentials, and AVG Anti-Virus Free were all available as free downloads.

To view the full version of the report in PDF format, including relevant graphs, go here.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

2 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Point of View, Reports, Software

Depending On Your Antimalware Applications For Internet Security? An Infection Is On The Way!

Let me begin this article by defining the word “responsibility”, a concept which appears to me, to be losing its place in modern culture.

Definition – a duty or obligation to satisfactorily perform or complete a task (assigned by someone, or created by one’s own promise or circumstances) that one must fulfill, and which has a consequent penalty for failure.

Virtually every computer user, at both the home user level and at the corporate level, whom I come into contact with, fails to take personal responsibility for their security on the Internet.

After all, the reasoning seems to be, I’ve got ABC anti-virus and ABC anti-spyware. Or, my employer takes care of that. But, as the above definition makes crystal clear, there is a penalty for failure to personally assume the burden of responsibility.

Look, the indisputable facts are:

As an Internet user you are engaged in a battle, yes a battle, against highly sophisticated and highly organized cyber-criminals who are relentless in their pursuit of your money and make no mistake – it’s all about the money; your money.

In the worst case scenario, your identity and your financial security can be severely compromised by these cyber-criminals.

It’s no accident that cyber crime is now a 100+ BILLION dollar industry. Make no mistake, this IS an industry. An industry which incorporates all of the strategic planning, and best practices, required to maximize profit.

Today’s cyber-crooks are smart; very smart. They are not, as many people believe, teenage hackers sitting at their computers playing at hacking.

Looking at recent estimates provided by a large number of Internet security providers, the consensus seems to be that there are over 20,000,000 malware programs currently circulating on the Internet. This is not the work of teenage hackers.

Many Internet security companies report having to deal with up to 20,000 new versions of malware – every single day! Here’s the math; one new malware program every four seconds!

Being involved in computer security, I am amazed, and frustrated, at the lack of personal responsibly exhibited by most typical computer users, and most importantly, the lack of commitment to acquiring the knowledge necessary to ensure personal safety on the Internet. In a word, becoming “educated”.

Users need to stop depending on their security applications alone to ensure their safety. They need to become proactive, which means becoming educated and personally responsible, rather than continuing to be reactive to threats to their safety.

Depending on security applications to provide the ultimate in protection, is an absolute “non-starter”. Security applications do not, and never have had the ability to this, despite the commonly held belief to the contrary.

If you’re struggling with the reality of this statement, take a look at “Testing of antiviruses for the treatment of active infections” from Anti-malware Test Lab. I guarantee you, you’ll be unpleasantly surprised.

Enhance your security on the Internet by:

Choosing to become educated on the realities of cyber crime.

Taking personal responsibility for your own security.

A major step you can take to in prevent yourself from becoming a victim of cyber-criminals is to overcome the instinctive response to just “click” while surfing the Internet.

That instinctive response poses one of the biggest risks to your online safety and security.

Stop – consider where you’re action might lead.

Think – consider the consequences to your security.

Click – only after making an educated decision to proceed.

Consider this from Robert Brault:

“The ultimate folly is to think that something crucial to your welfare is being taken care of for you”.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

23 Comments

Filed under cybercrime, Don't Get Scammed, Don't Get Hacked, Interconnectivity, Internet Safety, Personal Perspective, Spyware - Adware Protection, Windows Tips and Tools

Tips On A Layered Security Approach To Internet Safety

image Unfortunately, finding a balance between computer security and functionality can often be a question of “hit and miss”. By protecting your computer using the layered approach laid out here, you will reduce the chances of malware infections significantly without impacting convenience, and functionality, unduly.

Cybercriminals design malware to exploit vulnerable systems without user interaction being required – on the one hand, and craft attacks that take advantage of unaware computer users, in which user interaction is required – on the other hand.

The second part, of this two part attack approach, can only be defeated if the computer user is aware of current Internet threats. So, knowledge and experience, are critical ingredients in the never ending, and escalating battle, against cybercriminals.

In order to defeat attacks which rely on exploiting vulnerable systems, the preferred method to do so, is the implementation of a layered security approach. Employing layered security should ensure the swift detection of malware, before any damage occurs on the targeted system.

We live in a world in which we are surrounded by “buzz words”, and it seems that I’m occasionally guilty of using buzz words in writing this Blog. Buzz words which don’t always adequately explain a point, or which interfere with a readers understanding of a concept.

This was brought home to me recently when a regular reader emailed me privately; asking that I explain layered security. As I considered this, it occurred to me that this was a very legitimate question. From a reader’s perspective – just what is “layered security”?

What is layered security?

Let’s take the “buzz” out of layered security. Layered security, in its simplest form, consists of stacking security solutions, one on top of the other, to protect a computer from current, and zero day malware attacks (malware for which there is yet, no programmed defense).

Why do you need it?

The answer is pretty simple – gap management (words that are well know to consultants). In other words, no single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist in protection capabilities in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps. Keep in mind however, that even the best layered protection strategy will not make up for the lack of experience, and intuitiveness, of many computer users. So, I’ll repeat what I said earlier “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals”

A consumer layered security approach: recommendations.

Backup – While you may not think that a backup strategy forms part of a layered security approach to Internet security, it is, without exception, a most crucial part.

Consider where you would be if your layered security strategy failed. If you’ve ever lost critical data to a malware infection, no doubt you already consider it of primary importance.

Free backup utilities are readily available – see “Hard Drive Cloning is Easy with Free Easeus Disk Copy” and “Free DriveImage XML – “The Best Way to Backup Data?”, on this site.

Operating System and Application Patch Management – Again, this is an area that is often not considered as critical by many users. In a recent survey, Secunia, the Danish computer security service provider, well known for tracking vulnerabilities in software and operating systems, concluded that less than one in 50 Windows driven computers, are totally patched.

To stay ahead of the curve in this critical area consider downloading, and installing, the free Secunia Personal Software Inspector, which will constantly monitor your system for insecure software installations, notify you when an insecure application is installed, and even provide you with detailed instructions for updating the application, when available.

Firewall – Simply put,  a firewall is an application, or a hardware appliance, designed to block unauthorized access to your computer from the Internet, at the same time permitting authorized communications.

There are many free Firewalls available, but many can be intrusive and not really appropriate for casual computer users. Zone Alarm offers a very robust, uncomplicated, free Firewall, and more information is available here, “Download ZoneAlarm Free Firewall 2010 – Windows 7 Compatible”.

Antimalware – A front line antimalware application is absolutely critical to avoid system infection. Your primary application should be supplemented by an on-demand scanner (part of the stacking approach).

There is no harm in downloading more than one antimalware application to be used as a secondary scanner. In fact, doing so can be advantageous. However, be sure NOT to allow more than one application to autostart, in order to prevent conflicts. For a list and download links to recommended free antimalware applications, including secondary scanners, see “Tech Thoughts Top 8 Free Antimalware Applications”, on this site.

Antivirus – An antivirus application is another critical component in a layered defense strategy to ensure that if a malicious program is detected, it will be stopped dead in its tracks!

Avira AntiVir Personal (see “Free Avira AntiVir Personal Protection – Get the Real Deal!” on this site), is a very effective application which offers scans for viruses, Trojans, backdoor programs, hoaxes, worms, dialers and other malicious programs.

It’s simple interface provides access to a command structure, that makes it easy to repair, delete, block, rename and quarantine programs, or files.

Web Browser Security – Install a free Internet Browser add-on such as WOT (my personal favorite). WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

Please read “An IT Professional’s Must Have Firefox and Chrome Add-ons” on this site, which lists additional critical Browser add-ons.

System Isolation – An isolator is a security application which dynamically isolates Internet applications including Web Browsers, Chat Clients, Email Clients, and so on. Isolators, or sandbox applications, prevent damage from intrusions and malicious software: viruses, worms, spyware, key loggers etc., including disallowing rogue software from being installed. To understand this concept more thoroughly, please see “Free GeSWall Isolates You From Cybercriminals”, on this site.

Zero Day Protection – Since most viruses, worms, Trojans and other types of Internet threats only last 24 hours, how do security applications that rely on a definition database to identify malware files (most anti-malware applications), keep up with this onslaught? The simple answer is; they don’t.

Threatfire, from PC Tools is a terrific security application which covers the vulnerability gap with respect to zero-day threats. ThreatFire blocks malware (including zero-day threats) by analyzing program behavior (heuristics), based on the theory that if it looks like a crook and acts like a crook, then it must be a crook, instead of relying only on a signature based database.

For additional information and a download link please see – “Protect Yourself Against Zero Day Internet Threats with Free ThreatFire From PC Tools”, on this site.

Unfortunately, finding a balance between security and functionality can often be difficult. By protecting your computer using the layered approach laid out here, you will reduce the chances of malware infections significantly without impacting convenience, and functionality, unduly.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Browser add-ons, Browser Plug-ins, cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Internet Protection, Free Security Programs, Freeware, Hard Drive Imaging, Internet Safety Tools, Software, System Security, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Say “Yes” on the Internet and Malware’s Gotcha!

It's not my fault Virtually every computer user, at both the home user level (my friends), and at the corporate level, whom I come into contact with, tends to downplay personal responsibility for a malware infection.

I hear a lot of – “I don’t know what happened”; “it must have been one of the kids”; “all I did was download a free app that told me I was infected”; “no, I never visit porn sites” or, Bart Simpson’s famous line “it wasn’t me”. Sort of like “the dog ate my homework”, response. But we old timers, (sorry, seasoned pros), know the reality is somewhat different, and here’s why.

Cybercriminals overwhelmingly rely on social engineering to create an opportunity designed to drop malicious code, including rootkits, password stealers, Trojan horses, and spam bots, on Internet connected computers.

In other words, cybercriminals rely on the user/potential victim saying – “YES”.

Yes to:

Downloading that security app that told you your machine was infected. Thereby, infecting your computer with a rogue security application.

Opening that email attachment despite the fact it has a .exe .vbs, or .lnk.extension, virtually guaranteeing an infection.

Downloading that media player codec to play a  porno clip, which still won’t play, but your computer is now infected.

Clicking on links in instant messaging (IM) that have no context, or are composed of only general text, which will result in your computer becoming part of a botnet.

Downloading executable software from web sites without ensuring that the site is reputable. Software that may contain a Browser Hijacker as part of the payload.

Opening email attachments from people you don’t know. At a minimum, you will now get inundated with Spam mail which will increase the changes of a malware infection.

There are many more opportunities for you to say “yes”, while connected to the Internet, but those listed above are some of the the most common.

The Internet is full of traps for the unwary – that’s a sad fact, and that’s not going to change any time soon. Cyber criminals are winning this game, and unless you learn to say “NO”, it’s only a matter of time until you have to deal with a malware infected machine.

Here’s an example of a rogue security application getting ready to pounce. A progressively more common occurrence on the Internet.

image

image

I can’t say this often enough. Ensure you have adequate knowledge to protect yourself and stay ahead of the cybercrime curve. Make a commitment to acquire the knowledge necessary to ensure your personal safety on the Internet. In a word, become  “educated”.

If you lack this knowledge the answer is simple – you can get it. The Internet is full of sites (including this one), dedicated to educating computer users on computer security, including providing application reviews, and links to appropriate security software solutions.

It’s important to be aware however, that security applications alone, will not ensure your safety on the Internet. You really do need to become proactive to your Internet safety and security. And that does mean becoming educated.

Here’s a perfect example why there’s a critical need for you to take personal responsibility for your Internet security. Just this morning (May 11, 2010), I posted the following link to an article from ZDNet’s, Adrian Kingsley-HughesUPDATE – New attack bypasses EVERY Windows security product.

Those Internet users who become aware of this highly significant change in the Internet security landscape, will react accordingly. Unfortunately, experience has taught me that the majority of users will not hear of this. So, we’ll be faced with a new crop of cybercriminal victims.

As we have pointed out many times on this site, the instinctive human response to say “yes”, poses one of the biggest risks to online safety and security.

Before you say “yes”

Stop – consider where you’re action might lead

Think – consider the consequences to your security

Click – only after making an educated decision to proceed

Just a quick little aside here:

Earlier this year, I spent some time at my local hospital, and while I was there, I couldn’t help but notice Nurses logging on to Facebook. I was astonished to see, that this was happening on the the same system on which my personal medical records were stored.

Just as if it was ordained, the entire system suffered a virus infection while I was there. A little investigating showed that this was not the only malware attack, on that system, in the recent past. A dictionary definition of negligence, in my view.

Arguably, we’re facing a systemic problem – primarily a problem of computer users (both corporate and home users), lacking the necessary skills to protect against cybercrime.

But back to the topic at hand.

Consider this from Robert Brault:

“The ultimate folly is to think that something crucial to your welfare is being taken care of for you”.

I’ll put it more bluntly – If you get a malware infection; it’s virtually certain it’s your fault. You might think – here’s this smug, cynical guy, sitting in his office, pointing undeserved critical fingers. Don’t believe it.

If users followed advice posted here, and advice from other security pros, and high level users, the Internet could be a vastly different experience for many. At the very least, we might have half a chance of dealing more effectively with the cybercriminal element. To this point, we’re losing rather magnificently.

Computer users would be vastly better off if they considered Internet security advice, as a form of inoculation. It’s a relatively painless way to develop immunization. While inoculations can be mildly painful, the alternative can be a very painful experience.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

24 Comments

Filed under cybercrime, Don't Get Scammed, Don't Get Hacked, Interconnectivity, Internet Security Alerts, Windows Tips and Tools

Layered Computer Security – What Is It? Why Use It?

image Cybercriminals design malware to exploit vulnerable systems without user interaction being required – on the one hand, and craft attacks that take advantage of unaware computer users, in which user interaction is required – on the other hand.

The second part, of this two part attack approach, can only be defeated if the computer user is aware of current Internet threats. So, knowledge and experience, are critical ingredients in the never ending, and escalating battle, against cybercriminals.

In order to defeat attacks which rely on exploiting vulnerable systems, the preferred method to do so, is the implementation of a layered security approach. Employing layered security should ensure the swift detection of malware, before any damage occurs on the targeted system.

We live in a world in which we are surrounded by “buzz words”, and it seems that I’m occasionally guilty of using buzz words in writing this Blog. Buzz words which don’t always adequately explain a point, or which interfere with a readers understanding of a concept.

This was brought home to me recently when a regular reader emailed me privately; asking that I explain layered security. As I considered this, it occurred to me that this was a very legitimate question. From a reader’s perspective – just what is “layered security”?

What is layered security?

Let’s take the “buzz” out of layered security. Layered security, in its simplest form, consists of stacking security solutions, one on top of the other, to protect a computer from current, and zero day malware attacks (malware for which there is yet, no programmed defense).

Why do you need it?

The answer is pretty simple – gap management (words that are well know to consultants). In other words, no single security application is capable (nor should we expect a single application to be capable), of providing adequate computer system protection. Gaps exist in protection capabilities in even the most sophisticated security applications.

Layering (or stacking) security applications, offers the best chance of remaining infection free, by closing these gaps. Keep in mind however, that even the best layered protection strategy will not make up for the lack of experience, and intuitiveness, of many computer users. So, I’ll repeat what I said earlier “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals”

A consumer layered security approach: recommendations.

Backup – While you may not think that a backup strategy forms part of a layered security approach to Internet security, it is, without exception, a most crucial part. Consider where you would be if your layered security strategy failed. If you’ve ever lost critical data to a malware infection, no doubt you already consider it of primary importance.

Free backup utilities are readily available – see “Hard Drive Cloning is Easy with Free Easeus Disk Copy” and “Free DriveImage XML – “The Best Way to Backup Data?”, on this site.

Operating System and Application Patch Management – Again, this is an area that is often not considered as critical by many users. In a recent survey, Secunia, the Danish computer security service provider, well known for tracking vulnerabilities in software and operating systems, concluded that less than one in 50 Windows driven computers, are totally patched.

To stay ahead of the curve in this critical area consider downloading, and installing, the free Secunia Personal Software Inspector, which will constantly monitor your system for insecure software installations, notify you when an insecure application is installed, and even provide you with detailed instructions for updating the application, when available.

Firewall – Simply put,  a firewall is an application, or a hardware appliance, designed to block unauthorized access to your computer from the Internet, at the same time permitting authorized communications.

There are many free Firewalls available, but many can be intrusive and not really appropriate for casual computer users. PC tools offers a very robust, uncomplicated, free Firewall, and more information is available here, “ PC Tools Firewall – A Freebie Worth Having”.

Antimalware – A front line antimalware application is absolutely critical to avoid system infection. Your primary application should be supplemented by an on-demand scanner (part of the stacking approach).

There is no harm in downloading more than one antimalware application to be used as a secondary scanner. In fact, doing so can be advantageous. However, be sure NOT to allow more than one application to autostart, in order to prevent conflicts. For a list and download links to recommended free antimalware applications, including secondary scanners, see “Tech Thoughts Top 8 Free Antimalware Applications”, on this site.

Antivirus – An antivirus application is another critical component in a layered defense strategy to ensure that if a malicious program is detected, it will be stopped dead in its tracks!

Avira AntiVir Personal (see “Free Avira AntiVir Personal Protection – Get the Real Deal!” on this site), is a very effective application which offers scans for viruses, Trojans, backdoor programs, hoaxes, worms, dialers and other malicious programs.

It’s simple interface provides access to a command structure, that makes it easy to repair, delete, block, rename and quarantine programs, or files.

Web Browser Security – Install a free Internet Browser add-on such as WOT (my personal favorite). WOT tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

System Isolation – An isolator is a security application which dynamically isolates Internet applications including Web Browsers, Chat Clients, Email Clients, and so on. Isolators, or sandbox applications, prevent damage from intrusions and malicious software: viruses, worms, spyware, key loggers etc., including disallowing rogue software from being installed. To understand this concept more thoroughly, please see “Free GeSWall Isolates You From Cybercriminals”, on this site.

Zero Day Protection – Since most viruses, worms, Trojans and other types of Internet threats only last 24 hours, how do security applications that rely on a definition database to identify malware files (most anti-malware applications), keep up with this onslaught? The simple answer is; they don’t.

Threatfire, from PC Tools is a terrific security application which covers the vulnerability gap with respect to zero-day threats. ThreatFire blocks malware (including zero-day threats) by analyzing program behavior (heuristics), based on the theory that if it looks like a crook and acts like a crook, then it must be a crook, instead of relying only on a signature based database.

For additional information and a download link please see “Protect Yourself Against Zero Day Internet Threats with Free ThreatFire From PC Tools”, on this site.

The Internet is an uncertain world at the best of times, but by protecting your computer using a layered approach, you will reduce the chances of malware infections very substantially.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

17 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Application Vulnerabilities, Backup Tools, cybercrime, Don't Get Scammed, Don't Get Hacked, downloads, Free Anti-malware Software, Free Firewalls, Freeware, Internet Safety, Software, System Security, Viruses, Windows Tips and Tools

Just Say “No” to Computer Malware

imageIn the years I’ve been involved with computer security, I have rarely heard an infected computer user take responsibility for a malware infection.

Virtually every computer user, at both the home user level, and at the corporate level, whom I come into contact with, tends to downplay personal responsibility for a malware infection.

I hear a lot of – “I don’t know what happened”; “it must have been one of the kids”; “all I did was download a free app that told me I was infected”; “no, I never visit porn sites” or, Bart Simpson’s famous line “it wasn’t me”. Sort of like “the dog ate my homework”, response.

But we old timers know the reality is somewhat different, and here’s why. Cybercriminals overwhelmingly rely on social engineering to create an opportunity designed to drop malicious code, including rootkits, password stealers, Trojan horses, and spam bots, on Internet connected computers. In other words, cybercriminals rely on the user saying – “YES”.

Yes to:

Downloading that security app that told you your machine was infected. Thereby, infecting your computer with a rogue security application.

Opening that email attachment despite the fact it has a .exe .vbs, or .lnk.extension, virtually guaranteeing an infection.

Downloading that media player codec to play a  porno clip, which still won’t play, but your computer is now infected.

Clicking on links in instant messaging (IM) that have no context, or are composed of only general text, which will result in your computer becoming part of a botnet.

Downloading executable software from web sites without ensuring that the site is reputable. Software that may contain a Browser Hijacker as part of the payload.

Opening email attachments from people you don’t know. At a minimum, you will now get inundated with Spam mail which will increase the changes of a malware infection.

There are many more opportunities for you to say “yes”, while connected to the Internet, but those listed above are some of the the most common.

The Internet is full of traps for the unwary – that’s a fact, and that’s not going to change any time soon. Cyber criminals are winning this game, and unless you learn to say “NO”, it’s only a matter of time until you have to deal with a malware infected machine.

An example of a rogue security application getting ready to pounce.

image

image

Don’t play the “yes” game. Ensure you have adequate knowledge to protect yourself and stay ahead of the curve. Make a commitment to acquire the knowledge necessary to ensure your personal safety on the Internet. In a word, become  “educated”.

If you lack this knowledge the answer is simple – you can get it. The Internet is full of sites (including this one), dedicated to educating computer users on computer security, including providing application reviews, and links to appropriate security software solutions.

It’s important to be aware however, that security applications alone, will not ensure your safety on the Internet. You really do need to become proactive to your Internet safety and security. And that does mean becoming educated, and taking personal responsibility for your Internet security.

As we have pointed out many times on this site, the instinctive human response to say “yes”, poses one of the biggest risks to online safety and security.

Before you say “yes” –

Stop – consider where you’re action might lead

Think – consider the consequences to your security

Click – only after making an educated decision to proceed

Consider this from Robert Brault:

“The ultimate folly is to think that something crucial to your welfare is being taken care of for you”.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Don't Get Scammed, Don't Get Hacked, Email, email scams, Interconnectivity, Internet Safety, Malware Advisories, Online Safety, System Security, Windows Tips and Tools

Follow the 3 Magic Steps to Internet Security – Stop – Think – Click

Let me begin this article by defining the word “responsibility”, a concept which appears to me, to be losing its place in modern culture.

Definition – a duty or obligation to satisfactorily perform or complete a task (assigned by someone, or created by one’s own promise or circumstances) that one must fulfill, and which has a consequent penalty for failure.

image Virtually every computer user, at both the home user level and at the corporate level, whom I come into contact with, fails to take personal responsibility for their security on the Internet.

After all, the reasoning seems to be, I’ve got ABC anti-virus and ABC anti-spyware. Or, my employer takes care of that. But, as the above definition makes crystal clear, there is a penalty for failure to personally assume the burden of responsibility.

Look, the indisputable facts are:

As an Internet user you are engaged in a battle, yes a battle, against highly sophisticated and highly organized cyber-criminals who are relentless in their pursuit of your money and make no mistake – it’s all about the money; your money.

In the worst case scenario, your identity and your financial security can be severely compromised by these cyber-criminals.

It’s no accident that cyber crime is now a 100+ BILLION dollar industry. Make no mistake, this IS an industry. An industry which incorporates all of the strategic planning, and best practices, required to maximize profit.

Today’s cyber-crooks are smart; very smart. They are not, as many people believe, teenage hackers sitting at their computers playing at hacking.

Looking at recent estimates provided by a large number of Internet security providers, the consensus seems to be that there are over 11,000,000 malware programs currently circulating on the Internet. This is not the work of teenage hackers.

Many Internet security companies report having to deal with up to 20,000 new versions of malware – every single day! Here’s the math; one new malware program every four seconds!

Until a year or so ago, I agreed with the consensus that typical/average Internet users were simply unaware of the potential dangers all of us are forced to deal with while attached to the Internet? I’ve now revised my views.

Being involved in computer security, I am amazed and frankly frustrated, at the lack of personal responsibly exhibited by most typical computer users, and most importantly, the lack of commitment to acquiring the knowledge necessary to ensure personal safety on the Internet. In a word, becoming “educated”.

Users need to stop depending on their security applications alone to ensure their safety. They need to become proactive, which means becoming educated and personally responsible, rather than continuing to be reactive to threats to their safety.

Depending on security applications to provide the ultimate in protection, is an absolute “non-starter”. Security applications do not, and never have had the ability to this, despite the commonly help belief to the contrary. If you’re struggling with the reality of this statement, take a look at “Anti-Malware Solutions Test Results” from Anti-malware Test Lab. You might be in for a very unpleasant surprise.

Enhance your security on the Internet by:

Choosing to become educated on the realities of cyber crime

Taking personal responsibility for your own security

A major step you can take to in prevent yourself from becoming a victim of cyber-criminals is to overcome the instinctive response to just “click” while surfing the Internet.

That instinctive response poses one of the biggest risks to your online safety and security.

Stop – consider where you’re action might lead

Think – consider the consequences to your security

Click – only after making an educated decision to proceed

Consider this from Robert Brault:

“The ultimate folly is to think that something crucial to your welfare is being taken care of for you”.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under Application Vulnerabilities, Don't Get Scammed, Don't Get Hacked, Interconnectivity, Internet Safety, Online Safety, Personal Perspective, Spyware - Adware Protection, Windows Tips and Tools