Spyware breed because of different viruses, he brings benefits for users. The technique is normally used to make the browser so that the user to a particular website, stealing data finacial through a keylogger or display ads that force to be visited. Thus larger profits can diraup depend on the duration of the spyware in the victim machine. It is this characteristic that makes the spyware technology and familiar rootkits naturally. Rootkits that are designed to avoid pendeteksian by both the tools and os by his own patron to be good for spyware. For the malware this update, other than diligent av can also use software such as Microsoft's Revealer rootkits, F-Secure Blacklight's Corp., Sophos' Anti-rootkits, McAfee Inc..'s DeTecTiVe rootkits, and Trend Micro Inc..'s RootKitBuster.
9) Certificate of naughty
To ensure the legitimacy of the website, the browser implemented mechanisms seritfikat issued by the bodies that called trusted certificate authority (CA). So the second time the user with a browser that he visit the site as it has' magic letters' to ensure the legitimacy of the user. But what was technically unlucky Doe can inject a false certificate that allows him to access the website as the "official guest" website. Disadvantages clearly ... ranging from theft to the execution of data transactions in the name of another person or force users to visit sites naughty. Thus although the user machine clean from viruses and spyware, users can be infected by malware because the certificate that is planted on the naughty browsernya. To prevent this periodically check the validity of your certificate. By the way, the Internet Explorer check certificate in the Tools menu, Internet Options, Content, Certificates. Then on the tab Intermediate Certificate Authorities select Trusted Root Certification Authorities and the Trusted Publishers.
8) spay anti-malware with more than one way.
First anti-outfox how malware malware is setting the host to change the engine so that when the anti-malware that attempted to himself he failed to hold. Now the technique has been used more 'polite' and therefore more difficult detected. Malware mengerjai anti-malware now with the firewall setting change, run the script and memiripkan himself with the standard os on at once. To overcome this threat monitor the status of anti-malware updates you make sure that the same conditions with the status. It also recommended using EIcertificate authorityR a file examiner's antimalware. If your anti-malware fails to detect the test file ... the possibility of anti-malware you already barren.
7) Malware can update itself and scripts metamorphic.
Service anti-malware, the virus also overcome the technical problems to update their virus technology with auto update. By the way, more or less the same technical update botnet with, update files in the poll at one site (usually spoil site). Malware embedded in the victim machine will regularly access the website to update itself. To anticipate this, other than diligent to update anti-malware, data traffic should also monitor with the tools such as Microsoft Sysinternals' TCPView to detect the 'oddity' exit from the activities of the entrance system.
6) Peer-to-peer botnets
Previously ... at the time of the iron horse bite botnets controlled via IRC. This is easily abandoned because once defeated. Once the IRC server or channel it terlacak. Bot attacks easily stopped. Now ... the days of horse bite USB, creator of the botnet began to squint protocol peer-to-peer that is normally used Kazaa, Skype and Waste. To face this attack the only way is to monitor data traffic that enter the system with sniffer.
5). Worms are running in Web 2.0
Technology, which should make it easy for people to distribute information such as the MySpace, Facebook, Gmail, etc., and even used the manufacturer for malware menginjek malware to user accounts when users visit sites that are 'wrong'. Since then, other users who access the profile of the victims accoutnya also automatically terinfek. Attack the high-power sebarnya this fact that is relatively easily prevented by closing the account correctly (logout / sign out is different with Geri close the browser ...) after use.
4) Exploits on the client.
When Mikocok furiously make a secure server products range from various attacks, the malware even mentarget clientnya. Start from IE, office documents, outlook to a media player ... all the manipulations to spread malware. Because of the wide variation serangannya suggested implementing host-based intrusion prevention systems (HIPS), as have McAfee's Entercept and Cisco Systems Inc..'s Security Agent. HIPS can detect exploit a new stage in the potential. Always better to prevent than to treat you better?
3) attacks that increase access rights
Windows Vista released a new show business Mikocok hard to prevent rather than treat. Many organizations that menyepelekan restrictions on the rights to install applications, client-side so that when issues sekurity appear, the network has been too busy with the software "think clearly". But success, strengthen the client would spur "creativity" creator of the malware to exploit the client. Because, other than because the more users who gaptek instead of 3l1t33, so the client side because of the success of your target clients penetrate the need to remove the password and code Authentication other. Wong is sweet! To dispel this attack diligent, industrious and antimalware os update you.
2) Really big botnets (RBBs)
Botnet skipper of the approximately 100-300 system can be used. But now with more bervariasinya type of attack is estimated that there skipper botnet control system up to 60,000. With lasker in a botnet that attacks such as DoS blind dDoS and can cause losses far FAR more egregious than the first. This threat demands the cooperation of various parties such as fellow ISP, state agencies and of course the user organization itself.
1) shift the platform to non-computer tools.
Until now, most malware attacks is to focus on both the client computer and the server. But with increasingly high non-computer tool start of the smartphone, PDA to the ipod; penetrated the network and the Internet, only a matter of time before the creator of the malware attacks to focus the non-computer tools that. Unfortunately, though marked by the emergence of a virus-based bluetooth ... solution to this attack is still not reliable.
0 komentar:
Post a Comment