WEBMISTRESS DISCLAIMER TAGBOARD

Hello creatures! Welcome to my blog! Click the tabs above to explore my blog. Constructive criticisms are highly appreciated. Don't forget to leave a tag!
bold strong italic underline
♥ Visit Cynna's Blog ♥

Photo of the Day
Links

Link | Link | Link | Link | Link | Link |Link |Link | Link | Link | Link | Link

Credits
A Round of Applause to the following
Designer: Cynna
Image: Cyworld KR
Host: Blogger
Scripts : Dynamic Drive
Written @ 02:42
Scareware

Basically, scareware, also known as rogueware or put in simple terms, fake security software, is a legitimately looking application that is delivered to the end user through illegal traffic acquisition tactics starting from compromised web sites, malvertising, or blackhat search engine optimization, to ultimately attempt to trick the user into believing their computer is already infected with malware, and that purchasing the application will help them get rid of it.

how to prevent it ?

Most computer techs will tell you to use Mozilla Firefox as it does not allow ActiveX, Microsoft’s version of Javascript and that is a good start, but some sites rely on it more than Javascript. You can manually set your browsers to disable or notify you of every java/activeX script attempting to load, but you would quickly be overwhelmed by the pop-ups asking permission.
Whether you use Internet Explorer or Mozilla Firefox, there are now add-ons that disable Ads and scripts until you tell the add-on the website is ok. Usually they will add a notification bar or an icon in your browser to alert you that a script was stopped. At that point you have a decision to make. Do you really need to see what is missing

spear phishing

Spear phishing describes any highly targeted phishing attack. Spear phishers send e-mail that appears genuine to all the employees or members within a certain company, government agency, organization, or group.
The message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the company, such as the head of human resources or the person who manages the computer systems, and could include requests for user names or passwords.
The truth is that the e-mail sender information has been faked or "spoofed." Whereas traditional phishing scams are designed to steal information from individuals, spear phishing scams work to gain access to a company's entire computer system.
If you respond with a user name or password, or if you click links or open attachments in a spear phishing e-mail, pop-up window, or Web site, you might become a victim of identity theft and you might put your employer or group at risk.

how to prevent it ?

5 tips to prevent avoid spear phishing scams
Never reveal personal or financial information in a response to an e-mail request, no matter who appears to have sent it.
If you receive an e-mail message that appears suspicious, call the person or organization listed in the From line before you respond or open any attached files.
Never click links in an e-mail message that requests personal or financial information. Enter the Web address into your browser window instead.
Report any e-mail that you suspect might be a spear phishing campaign within your company.
Use Internet Explorer 7 or the Windows Live Toolbar, both of which contain Phishing Filter, which scans and helps identify suspicious Web sites, and provides up-to-the-hour updates and reporting on known phishing sites. To learn more, go to Phishing Filter: Help protect yourself from online scams.

Auto Run attack !

AutoRun was introduced in Windows 95 to ease application installation for non-technical users and reduce the cost of software support calls. When an appropriately configured CD-ROM is inserted into a CD-ROM drive, Windows detects the arrival and checks the contents for a special file containing a set of instructions. For a commercial application, these instructions normally initiate installation of the software from the CD-ROM. To maximise the likelihood of installation success, AutoRun also acts when the drive is accessed ("double-clicked") in Windows Explorer (or "My Computer").

how to prevent it ?
Generally all the secondary storage devices have this feature of Autorun and this virus virus takes advantage of this feature and infects our system. So, we ought to have a good anti-virus on our system to take care of it. Today, we will be reviewing a tool which will specially take care of Autorun.inf file and if any suspicious changes are detected in the files then it will take care of it and this tool is called as No Autorun.

Now, you can easily predict about the reason for which this tool has been developed. We have already published some of the tools which are useful in removing the viruses like Avira, AVG and few more but still they take care of all the viruses which are present in your system but the above cited will take care only of the autorun virus. So, I can say that this tool will be more effective as compared to the other anti-viruses. So, if you have a habit of attaching secondary devices to your system then you should go for using this tool.