Tampilkan postingan dengan label Security Advisories. Tampilkan semua postingan
Tampilkan postingan dengan label Security Advisories. Tampilkan semua postingan

Rabu, 05 Agustus 2015

Outbound Traffic Detected. Is My Computer Infected?

If you spend any considerable amount of time online, whether you are browsing the internet for fun or you are using it for work, then you really need to be well aware of the different risks that you face. The amount of viruses, malware, and other parasites and scams make using the internet a little like taking a walk through a mine field. And the problem is only compounded by the fact that because there is good money to be made in this area, there are constant upgrades being released to existing threats, and new and different ones springing up all the time. Outbound Traffic Detected pop-up message usually means that your anti-virus program has detected a large amount of suspicious outbound traffic on your system. In other words, there are malicious programs on your computer that somehow got slip through undetected and now try to establish remote connection with C&C servers or even worse - send sensitive information to cyber criminals. Most of the time, outbound traffic is being sent by Trojan horse malware.

So stay one step ahead of just one of these types of malicious software by learning a little more about something called a Trojan Horse.

If you keep getting "Outbound Traffic Detected" pop-up message then your computer is probably infected with malware, most likely a Trojan horse. This is a particularly vicious type of malware that has been created with the aim of causing you maximum disruption and, often irreversible, harm. Trojan Horse malware is very sneaky when it comes to installation tactics and it uses you and your trusting nature to give it an unwitting helping hand. To say a Trojan Horse infection is inconvenient is to do it a disservice and it is something which can have a lasting effect on both you and your computer.

Trojan Horse tactics

Trojan Horses can infect you in a number of different ways. They might be an attachment in an email, or a link or file sent by instant message. They can also be hiding in a program or application that you downloaded thinking it was harmless. A Trojan Horse programmer fools you into opening and installing or downloading their malware by encouraging you to believe that is innocent. It might be disguised as a fun game, a useful lifestyle app. And if you stop a moment to think about it, you'll see the pattern and understand where the malware got both its inspiration and its name from.

Just like the huge wooden horse built by the ancient Greeks as a ploy to hide their soldiers in and convince their enemies, the Trojans to accept beyond their city gates, a modern day Trojan is something which plays on its victims' naivety to attack them from within. Here's an example of a message you can get when a Trojan horse or other malware tries to send outbound traffic:


In this case it's Security Request Norton Outbound Traffic Detected message but yours might be different (depends on your anti-virus). The problem is that even if you re run the program it comes up that everything is OK. As a result, you need to use anti-malware software to remove malware that your anti-virus misses. Thankfully, there are a few tools specifically designed to detected malware which is sending out outbound traffic.

What will a Trojan Horse program do when it has been installed on your PC?

Needless to say, it will send outbound traffic on your computer. But it really has one goal in mind and that is, once it has hijacked your PC, it will begin to attack you from the inside. Trojan malware particularly likes to encrypt files, data and documents, making them inaccessible while the infection is on your machine. Some Trojans even take this one step further by going straight for the jugular and simply destroying files and data from the get go.

Trojan Horse malicious software and Outbound Traffic: a conclusion

Trojan Horses and other malware are a lot nastier than a lot of the other types of malware that you might have read about so make sure you download a great anti-malware program and do everything you can to protect your PC from this thoroughly unpleasant malware. If your computer is already infected and you can't seem to get rid of this dangerous malware, please follow the steps in the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!

Written by Michael Kaur, http://deletemalware.blogspot.com



"Outbound Traffic Detected" Malware Removal Guide:


1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.






NOTE: If you are using Internet Explorer and can't download anti-malware software because "Your current security settings do not allow this file to be downloaded" then please reset IE security settings and try again.

2. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.



3. Wait for the scan and disinfection process to be over. Then click Continue. Please reboot your computer after the disinfection is over.



Senin, 01 Juni 2015

Does Safari Private Browsing Hide Your IP Address?

Does Safari Private Browsing mode hide your IP address? The short answer is NO. The latest buzzword on the technology front is private browsing mode and in today's world where we are increasingly exposed to breaches and invasions of privacy it might sound like something that could be of great interest to you. However before you get too excited, it's well worth knowing that even if you are using private mode in Safari, while your privacy will be greatly enhanced, it is not a magic wand that makes you completely invisible.

The basic tenet of Safari private browsing is that it alters the way your browser operates. Private browsing is called different names in different browsers, so depending on what you're using, you'll either see Incognito Mode in Google Chrome, InPrivate Browsing in Internet Explorer, and other similar terms in Opera, Mozilla etc.

Browsing normally in Safari


When you browse the web normally Safari web browser saves your history – i.e. the websites that you've visited, cookies and the data they've collected from sites you visit, passwords you've saved, and any files you have downloaded.

What this means is that anyone logging on to your computer can simply access your browser and see all of this information. What's more, they won't need to access your history either. Just by typing a search term into a search engine or a website URL into your address bar, Safari will helpfully bring up the list of sites or keywords that you've previously been looking for. Of course, like most aspects of your computer's operating system you could disable some of these tools, but how many of us even think about doing that in advance?

Browsing privately in Safari


So, as we've seen, if you are using the internet in 'normal mode' your web browser will be storing your search history and any related data and downloads. Switch on private browsing mode and none of this information will be collected – apart from cookies, which will usually be stored while you are online, however these should be deleted as soon as you close the browser.

So far so good, but one thing you do need to be aware of is that when you're using Safari's private browsing mode it will only be activated on the websites that you consciously use it for. If you have three tabs open with a different website open in each, just because you have activated private browsing mode in the first tab, don't think that the remaining two websites will be incognito too as they won't be. For 100% private browsing (as much as it can be said to be private), you have to turn on private mode separately for all of the sites you are looking at.

Other privacy issues with private browsing mode


Okay, so we know that Safari is not able to monitor you when you're online if you have private browsing mode activated but what about other applications? If you're unfortunate enough to have a malware infection – such as spyware or a keylogger – then there is absolutely nothing to stop them from spying on you. Private browsing mode won't stop anyone – from malicious third parties to parents using parental control software to companies that monitor employee web usage - from seeing what you’re up to online.

Another thing you need to be aware of if you're thinking that private browsing has your back is that although your browser will be prevented from saving your history on your PC, that doesn't mean that other parties are subject to the same restrictions. Put simply, it will work for you, but not for other parties.

External computers, routers and servers that are all connected to your computer will still be able to see your activity, IP address and location – no matter whether private mode is on or not. Let's take this as an example: you've turned on private mode and settled down for an enjoyable afternoon spent uploading your vacation pictures to Facebook – while using your employer's or school's network. This activity might go undetected by your computer but your usage is still easily accessible on your business's or institute's routers. Safari Private mode also doesn't conceal your IP address either, so servers will still know your physical location. That's not to say you can't hide your IP address – you can by using a VPN for example – but private browsing won't do that for you.

Looking at websites of a dubious nature in the comfort and privacy of your own home? Well don't think that private browsing will save you here either as all search requests are still being routed through your Internet Service Provider, eventually ending up on their servers.

To conclude


Private browsing mode might sound like a dream come true for anyone who wants to hide their searches – for pure reasons or foul, or for those who are hoping their boss or teacher won't notice if they're slacking off, but it's not quite the foolproof safety net many people assume it is. Yes, it can conceal your browsing history from anyone using your computer but that doesn't mean it won't be logged in multiple other places. And if you really want to browse the Internet in anonymity you need a VPN as this will go one step further than private mode and hide your IP address - from everyone. It also encrypts data and traffic meaning that if you really don't want anyone to know which sites you visit, it's your only option.

Rabu, 06 November 2013

Is someone watching you through your webcam?

Sounds like something from a sci-fi movie or a far-fetched thriller doesn’t it? Clicking your mouse just a couple of times activates your computer or laptop’s webcam. So far so convenient. But what the majority of us don’t realize is that while we’re busy working or surfing the web, someone could be watching us.


The curse of the RAT

You’re probably thinking this is already creepy enough without me throwing rats into the mix but a RAT (Remote Access Tool) is the software that hackers use when they want to remotely hack into a computer. RATs are actually used legally by computer engineers to remotely troubleshoot issues on someone else’s PC. The difference is that the person with the tech issue asked the engineer to fix their problem. Hackers, clearly, exploit this technology for their own means. Put simply if you’ve been hacked and your webcam is activated, you could be under surveillance. RAT tools are usually divided into two groups: commercial/free and malicious. Your antivirus software may detect some of the commercial tools as potentially dangerous which is a good thing to know because someone might indeed use them they way they should not be used. Malware does everything to hide itself, so obviously it won't be visible on your screen. If the webcam is being run by cleverly designed malware you may never see webcam sofware running on your computer.

How can I tell if the webcam has been hacked?

Usually, when the webcam goes on, the light should go on, too. However, certain malicious programs that were designed to activate your webcam and spy on you may turn on your camera without turning on the light. This is especially true if the light is under the control of webcam software. So, if you suspect that someone might be watching you through your built-in webcam for example, scan your computer with anti-malware software. Spybot is usually a good choice. SUPERAntispyware and Malwarebytes may be useful as well.

How does a RAT get onto my PC?

The way RAT software installs itself on your machine is much like any other piece of malware. You’ll be enticed into clicking on a link, opening an attachment in an email, downloading a seemingly innocuous piece of software or visiting either an unscrupulous website or one that has been hacked.

The RAT, a little like its namesake sneaks onto your computer and just like that a hacker has remote access to your machine - and your webcam.

How do I stop my webcam from being hacked?

Many people tell you to address the problem by covering your webcam’s lens with a piece of paper; however doesn’t this seem like an ostrich-like reaction? The proverbial burying your head in the sand. If your webcam has been hacked, so too has your PC and that can lead to real problems.

The trick therefore is to prevent yourself from being hacked in the first place and there are a number of sensible steps you can take to protect yourself.

Install anti-malware software and a two-way firewall

This really is the basic protection for any PC. Make sure your anti-malware is the latest version and that you run it frequently. A good anti-malware will find and remove malware and viruses. A two-way firewall oversees what traffic is inbound and outbound on your machine.

Watch what you’re clicking

We’ve all seen those fun free icons or wallpapers or been tempted by free downloads but hackers embed their malware code into these and use them to install their malware - or RATs. Therefore make sure you trust the site you are downloading from. Also be wary of links in social media sites such as Facebook and Twitter that have been shortened so you can’t tell where they’re linking to.

Be wary of so-called remote IT support companies

Getting emails or phone calls from someone telling you that you have an issue that needs to be fixed on your computer? What’s that you say, you can fix it remotely? No thank you very much!

Make sure you use a secure Wi-Fi network

Any hacker worth his salt can hack into an unsecure wireless connection with just a laptop, an antenna and the right (easy-to-find) software. Protect yourself by choosing a strong and abstract password – and change it on a regular basis.

Disable Windows Remote Access

One way to make your computer less vulnerable is by disabling Windows Remote Assistance and Remote Desktop. Although, as discussed, the majority of RATs hack your system through links and attachments this is still a sensible step to take.

Follow the steps below to disable Remote Assistance and Remote Desktop for Windows 7 and Windows 8:

1. Click Start and go to Computer.

2. Right click on Computer and choose Properties.

3. On the left you’ll see Remote Settings. Click it.

4. Go to the Remote tab and un-tick Allow Remote Assistance connections to this computer.

5. Then click Don’t allow connections to this computer. Click OK.

Protect your computer, your files and your privacy and don’t fall victim to having your webcam hacked.

Jumat, 19 Juli 2013

Best PUP and Adware prevention software

Best PUP and Adware prevention software

We’ve probably all been there; we’re innocently surfing the web and suddenly we’re presented with a link to a website or an advert that looks like it’s just too good to ignore. We click... and then suddenly we find ourselves bombarded with a veritable volley of dubious looking pop up adverts, pop up surveys or have been redirected to websites of a somewhat questionable nature.

Likewise, again, I’m sure I’m not alone when I say that I’ve installed a tempting looking free download and then boom! - my computer is running like it’s 1000 years old. And you know why? Because I’ve inadvertently also downloaded a program which is now monitoring my every online move.

Scary stuff indeed so say hello to PUP (Potentially Unwanted Program) and adware – the internet software that has been designed to not only be irritating but that can be downright dangerous too.

What are PUP and Adware?


PUP is sneaky and very often it weasels its way onto your PC without your knowledge or your consent. Usually, PUPs come bundled with popular software downloads and freeware. Examples of PUP can be toolbars, custom search engine providers and other add-ons. When you’re online it will run in the background surreptitiously spying on you and gathering data about your internet browsing habits.

Whilst PUPs are annoying and sometimes difficult to get rid of, adware is slightly different and slightly less menacing. Adware’s main purpose is to display adverts in the form of pop-up windows and banners, on your computer. Whilst some of these ads are genuinely advertising real products, many of them will include links to websites. Websites you probably don’t want to visit in the first place.

Like PUP, a lot of adware tracks which sites you are visiting and then relays that information back to its creator so that they can send you more dedicated advertising. It’s fair to say that whilst some people don't mind this practice others find it highly intrusive.

The biggest thing to bear in mind about PUP and adware is thinking whether or not you wish to have that type of program operating on your PC. Really it all comes down to how you feel about online privacy and security. Or whether you can be bothered to have to close pop-up adverts every few seconds! If you don’t like it and you don’t want it it falls into the category of unwanted software – and you need to know how to prevent and get rid of it.

Getting Rid of PUP and Adware


It doesn’t matter whether adware is slowing your computer down or leaving you vulnerable to attack by identity fraudsters; adware is not called malware for nothing. The reason that your PC will be running so slowly if you’ve downloaded one of these programs is because PUP and adware are using up your system’s resources because they are constantly sending data to their servers.

As I said, in the majority of cases PUP and adware is bundled with other programs – such as freeware - that you’ve downloaded and whilst it is fair to say that there is often some acknowledgment of their existence in the software's licensing agreement it is usually hidden within reams of complicated (and boring) wording – which means that most of us don't read it. The thing is that whilst some people see it as a fair deal: I get free software but I also have to put up with being spied upon – a lot more people object to it.

This isn’t the only way that malware finds its way onto your computer as simply browsing the web can do it too. A lot of the time just clicking on a fake dialog box or pop up window is enough to end up with you having PUPe or adware downloaded onto your PC. And of course these boxes and windows will make it as hard as possible for you to refuse with so-called urgent messages or offers that you can’t refuse. Many of the windows will usually give you the option of clicking ‘yes’ or ‘no’ however simply clicking the window – whichever you choose - will end in malware being downloaded onto your machine. The rule: close the window using the little red ‘x’.

Preventing PUP and Adware


First and the most important thing to do is install reputable PUP and Adware protection software. Unfortunately, most PUPs are not detected even by the most popular anti-virus programs. The reason is simple, PUP is not technically malware. But it's potentially dangerous and annoying. Adware detection ratio is also low, however, better than PUP. Thankfully, there are programs that fill in this gap, for example Spybot, Malwarebytes and SUPERAntispyware.

Often, being the victim of a malware attack can be our own fault. The things to look out for include:
  • Watch what you’re downloading – think to yourself whether you really need that software or program before you click ‘ok’. Check the name of the programmer and use a search engine to do some research if you’ve never heard of them or their technology.
  • Whilst ActiveX is fine when a reputable site uses it, it is also highly prized by hackers as a means for installing spyware without you knowing about it. To be on the safe side turn it off in your browser preferences. If you need to turn it on when visiting a site you trust you can do so easily.
  • It might be tedious but read those freeware licensing agreements carefully and check the wording for anything that suggests that data capturing might be involved.
  • Don’t fall victim to anti-spyware scams – they’re all over the web and despite disguising themselves as genuine security software they will either do nothing to protect your computer – or in some cases will install even more malware on it. You can usually tell if one is rogue because they will offer to run a free scan on your PC – and of course they’ll find loads of problems. And then ask you to buy their software.
  • Don’t click on adverts. They might look colorful and flashy but these should be a red flag to a bull and you will be highly likely to end up being monitored by someone.
It looks like PUP and adware are here to stay but it is in your hands as to what malicious software can find its way on to your PC.

Jumat, 21 Juni 2013

Is it safe to use a VPN service to change IP? How to find the right one for you?

Is it safe to use a VPN service to change IP? How to find the right one for you?

Chances are that you don’t use a VPN – a Virtual Private Network – and may not see the point in having one but the fact is that a VPN has a number of benefits and you really should consider using one, especially if you have any concerns about your privacy when you’re browsing the internet.

Selecting which VPN service is right for you can seem a little tricky at first as there are so many providers on the market - and they are all battling it out to get your business. If you’re not sure where to start looking for the right VPN for you, read on as we take a look at the things you need to know.

First of all, what is a VPN?


A VPN refers to a group of computers which are connected together via the internet. If you’re a business you can connect to a remote data center via your VPN and if you are a home user you can use it to connect to a network even if you’re not on the same local area network (usually abbreviated to LAN). A VPN is also hugely beneficial as it will secure and encrypt your data if you are using a public network – for example if you’re using a PC in your local library or your laptop in a coffee shop.

Connecting to a VPN is simple; you will either have a VPN client installed on your computer, which you launch when you want to connect, or you may need to log in to the provider’s website. Once you have launched or logged in your PC and the VPN’s server will verify each other and as soon as they recognize each other as being genuine your computer's internet connection and thus your data and communication will be securely encrypted so that no third party can access it.

A VPN is multi-functional too as not only will it allow you to safely connect to the internet but it will also allow you to watch television programs that are being aired abroad.

What can your VPN Do for You?


As we’ve seen a VPN can increase your security and ensure that your data isn’t been viewed by unscrupulous cyber criminals, and it enables you to access information when you’re not physically connected to a certain network, however there are different ways that you can use your VPN.

Whether you’re a student, an employee or you’re self-employed you may want to use a VPN so that you can always connect to a network no matter where you are. If you are security conscious and want to make sure that no one is accessing your data when you’re using public Wi-Fi a VPN is invaluable for protecting your privacy.

VPNs are also a must if you download a lot of torrents. Whether they are legal or illegal you don’t want to end up in trouble with the authorities or having to pay a fine just because you wanted to watch the latest episode of your favorite TV show.

Even if you’re not downloading torrents and you just want to watch a live sporting event or you want to view a program as it airs instead of waiting for it to be made available online (thus avoiding spoilers!) a VPN will allow you to do so. It will also let you listen to internet radio that may only be available in certain locations as well as giving you access to web based services or resources that are limited to a certain country or region.

Regardless of how important downloading torrents or watching television programs is to you, a VPN is a must when you’re working or browsing the internet on a public or unknown network. No matter whether you’re in an airport, a hotel or a cafĂ© or restaurant if you don’t know that network, how do you know who also has access to it – and potentially your data. Even just checking your Facebook or Twitter account on a public network can put you at risk.

Choosing the Right VPN Service that Takes Anonymity Seriously


It really depends what you want to use your VPN for. Some VPNs are best for light usage, others are better if you do a lot of downloading and want to protect yourself whilst doing so and others still are aimed at avoiding the regional restrictions that some companies put on their apps and services.

So what are the things you need to consider when choosing the right VPN for your needs?

Protocol: the first thing you’ll probably spot is that you keep coming up against confusing sounding abbreviations such as SSL/TLS (also called OpenVPN Support,) PPTP, IPSec and L2TP – to name but a few. These are all VPN types and they will all give you a secure network connection however the most widely used type of VPN is SSL. Each type has pros and cons, however if you’re a regular home user you don’t need to get too bogged down in the fine details.

Where are the servers and exits: these depend on what you’re using your VPN for as well as where your server is and the locations of the ‘exits’. Put simply, what this means is that if you’re looking for a VPN so you can watch live television and you’re living in Canada, you need to check and see that the VPN provider has servers in Canada too. If you want a VPN so that you have extra privacy when you’re downloading torrents it might be an idea to choose a provider who is not based in the same country as you. It is also wise to ensure that your VPN provider has servers in a number of locations.

Logging data: connecting to a VPN means that you are entrusting the provider with your data and whilst it is true that you are protecting that data from people outside your network your information could still be logged by the service provider or even other systems that are using the same VPN. If you are concerned about this read all the small print and make sure you understand what your VPN provider’s policies regarding logging are. If the company doesn’t actually keep logs it’s not such a big deal which country they are situated in.

Protection against malware and spyware: don’t make the mistake of thinking that just because you’re using a VPN you’re immune to attacks by malware and viruses. Continue to use HTTPS whenever you can and remain vigilant when downloading torrents, programs or software. If you are concerned however, do some research because some VPNs also come packaged with anti-malware and anti-spyware programs to give you extra peace of mind.

Mobile applications: whether you’re paying for your VPN or not it makes sense to get as much use from it as possible so make sure that you can use it across your range of devices, whether it’s your desktop PC or a smartphone. The majority of the biggest VPN providers have both desktop and mobile security which is far less hassle than having different VPNs for each of your phones, tablets or laptops.

The cost: there is a wide range of both free and paid-for VPNs out there so make sure you do your research, especially before buying a service. There are often quite substantial differences between the two types too:

Whilst a free VPN is perfectly adequate for light use or if you’re traveling and want heightened security, these services are more likely to record your online activity, so if privacy is the main reason for using a VPN, you might want to consider spending a little money instead. Free services also often have adware bundled in with them so you will likely start seeing those annoying little pop-up ads when you’re online too. They often also have a lower number of exit locations and are not as concerned with your privacy. A few good free VPN services are:
  • SecurityKiss
  • CyberGhost
  • ItsHidden
  • TunnelBear
A paid for VPN is usually a lot more dedicated to your privacy and is unlikely to bombard you with adverts. The thing to look at here, if it is of importance to you, is whether or not they log your activity, as this does depend on the provider. If you’re going to pay for your VPN opt for a company who is offering a free trial – many of them do – so you can see how well you get along with it before handing over any money.