It’s well known that some anti-virus programs are better than others at given times. Mostly because of how soon the signatures (tells that are used to identify malware) are updated. There is also a difference between their methods: some use signatures to identify the malware and some use an analysis of the behavior of the computer and the malware to identify anomalies and alert you when they’re found; and a few anti-virus programs use both methods of detection.
So, given that some are better than others at identifying malware, is it a good idea to run more than one anti-virus program for better protection? The answer is no…and maybe.
I’m reposting one of the all-time most popular articles I’ve written on this blog (it is third most popular). I’m doing so because our newer readers may have missed it and because using a sandbox is one of the most effective Internet security tools that can be used to protect your computer.
A computer security sandbox is a virtual computer environment which resides on the disk of your computer. By virtual, I mean a totally operable “computer” that is created and controlled by software and looks and feels to other software packages, browsers, and yes…malware; just like a computer—but it’s not. And…here’s the best part…the sandbox is completely controlled and sealed off from the rest of the host computer. So, if you were browsing the Internet using a sandbox and a virus got by your firewall and anti-virus protection and infected your virtual “computer” sandbox; the virus would be contained within the sandbox and at the end of your browsing session would be deleted without causing any harm to your real computer. Continue reading
Target: Mobile Devices is the second installment of the series of “Target” articles, discussing the various areas the cybercrime organizations are attacking. Unfortunately for computer users, our Internet environment is, as the military would say, “a target rich environment”. See Target: Social Networking Sites, the first article, to get some background on the tactics and strategies of cyber crime organizations.
Mobile devices include smartphones, tablets, PDAs, or any small, handheld computing device that can access the Internet. Continue reading
We have repeatedly warned against using mobile devices for financial transactions, including online purchases; because mobile devices such as smartphones—Android and iPhone, iPad and other tablets, are targets of cyber criminals eager to inject them with financial and other malware. Continue reading
According to Security Week.com, a new Black Hole Exploit Kit (malware that has been “packaged” so that the cyber criminal could easily operate it without an IT staff, and more importantly so that he doesn’t have to program his own malware) has been released. “ Black Hole is one of the most popular exploit kits on the Web, accounting for nearly 40 percent of all toolkits detected on the Web by security firm AVG Technologies in the first quarter of 2012.”
Black Hole is capable of delivering multiple malware, including the Zeus banking trojan, to unsuspecting computer users via the Internet. Continue reading
In a previous article, Cell Phones And Phishing Attacks: Do You Use Your Phone Safely? I presented the security threats of mobile phones and computing devices. And how cybercriminal organizations have targeted this area of computer use. The article also points out that the mobile phone space is ripe for picking by phishing scams and botnets using malware such as the Zeus bot. The Zeus bot is targeted at stealing your online banking credentials and draining your bank accounts. So much for the bad news. There is help available now, to protect these mobile computing devices. Continue reading
A computer security sandbox is a virtual computer environment which resides on the disk of another computer. By virtual, I mean a totally operable “computer” that is created and controlled by software and looks and feels to other software packages, browsers, and yes…malware; just like a computer—but it’s not. And…here’s the best part…the sandbox is completely controlled and sealed off from the rest of the host computer. So, if you were browsing the Internet using a sandbox and a virus