Monday, May 25, 2009

Keeping the Worms Away. How to Minimize Virus Threats.

. Monday, May 25, 2009

by Bobette Kyle

The battle against computer viruses and worms has gone on since the dawn of the virtual age. Over time, worms and viruses are evolving and the numbers are growing.

According to the Computer Knowledge Website "there were over 50,000 computer viruses in 2000 and that number was then and still is growing rapidly. Sophos, in a print ad in June 2005 claims 'over 103,000 viruses.'"

Technical experts and risk specialists understand that worm attacks and viruses are here to stay, to the extent that predicting and preempting attacks has become an industry. For example, McAffee publishes an ongoing virus information calendar where you can track expected future attacks by day or view virus/worm attack history. By methods such as this, McAffee and other security companies protect their customers by trying to stay a step ahead of new variants.
Worms can directly and adversely affect you in many ways.

No small business or individual email user is exempt from exposure to worm / virus attacks. As the number and variations of viruses grow, so does the risk to any email user.

There are several ways worms and viruses can adversely affect you. A few of these are:

1. Email worms can "spoof" your email address (put your address as the sender of infected emails), making it look like you are sending spam and viruses even though you are not.
2. They can infiltrate your systems, sending out infected emails from your computer.
3. The more malicious viruses can erase your hard drive or completely disable your computer systems.
4. Some may install software on your system (remote access trojans - RATs) that allows others to access, steal, and/or change your computer files.

If you are a list owner, this deluge of worms could tarnish your reputation with some people who do not understand spoofing. Since your email address is likely to be in a lot of email address books, your address will invariably show up as the "from" address in many infected emails.

This results in lost productivity as you sift through unwanted email, update protection systems, shore up security holes, and repair/head off other damage.
How Worm Viruses Work

As technology evolves, viruses evolve as well. At first, most viruses spread through email attachments. Now - with the proliferation of broadband "always on" connections, file downloads, instant messaging, Bluetooth-enabled mobile devices and other communications technologies - the ways worms and viruses spread have evolved as well. Still, email viruses cause the most overall problems. In December 2005, for example, the Sober-Z virus accounted for 79% of all viruses (as reported by Sophos).

In general, a worm virus is a program with the ability to spread itself through email. When the worm infects a machine, it spreads itself by sending infected email to addresses in the computer's email address book. The worm also uses one of the addresses as the "from" address, making it appear to recipients that the email came from someone else.

When a worm or virus that spreads through email infects a machine, it sends infected email to addresses in the computer's email address book. Many worms also use one of the addresses as the "from" address, making it appear to recipients that the email came from someone else.

Some worms also deposit a bit of code on your computer, presumably designed to carry out some future maliciousness.

It is all more complicated than this, of course, but I'll let the technical experts explain the nuances. Here are some recent articles about worm viruses:

Data Security Summary - January to June 2005, from F-Secure Corporation, explains all types of computer security risks, including viruses.

RATs: Remote Access Trojans and how to help avoid them from Microsoft.

Top ten viruses and hoaxes reported to Sophos in December 2005
What you can do.

Short of abandoning email and staying away from the Internet, we are all at some risk. We can, however, minimize risk by arming ourselves with (a) knowledge, (b) updated protection / security systems, and (c) communication. Also, of course, don't open unknown email attachments.

Knowledge

Sign up for email alerts through a trusted security company or monitor alert pages often. Also, make it a habit to read up on the most prevalent attacks. This way, you can recognize the signs of attack.

Here are links to three comprehensive virus/security sites:

F-Secure Security Information Center, includes information about viruses, hoaxes and other security risks.

Symantec Security Alert, sends email alerts of high-level threats, how to remove/detect viruses, etc. Also has a Security Response section on the site at http://securityresponse.symantec.com/ where you can read about current viruses and check your computer for vulnerabilities.

McAfee Security sends out alerts and breaking news. Also posts news and current threats on the site.

Updated Protection and Security Systems

In today's email and Internet environment, protection systems are no longer optional. Each computer with Internet/network/email access should have a good anti-virus and Internet security system installed and updated regularly (most have a feature that will automatically check for updates).

Some attacks exploit weaknesses in Microsoft software, so keep your Windows software up-to-date as well. Here is a link:

Microsoft's Windows Update center checks the software on your Windows computer then gives you a chance to download critical updates.

There are many firewall and anti-virus programs out there. Two popular choices are:

Norton Internet Security includes a firewall, virus protection, and other Internet security functions.

McAfee pcsecuritysuite protects your computer against viruses, hackers, and identity thieves.

Communication

Explain to others the importance of secure, protected systems and guide them to more information. If you are a writer or publisher, remind your readers to stay up-to-date and knowledgeable.

Virus and worm attacks are here to stay. That does not mean, however, that they must be detrimental to your business. Diligently follow these three steps and you will be prepared for the next wave of new viruses.

0 komentar:

:)) ;)) ;;) :D ;) :p :(( :) :( :X =(( :-o :-/ :-* :| 8-} :)] ~x( :-t b-( :-L x( =))

Post a Comment

 
Namablogkamu is proudly powered by Blogger.com | Template by o-om.com