Thursday, August 15, 2013

Cyber Security Part 2 - Reality Check

Malicious Code:   Serious Business

Viruses and malware are arguably are one of the biggest threats to our way of life in this country.   Wow, dramatic stuff eh?

Right now we are in the glorious period of Internet Utopia where everything and anything can be found online, but as we all know from our experience with human nature, where there is money to be spent and made, there will be those who go about it dishonestly.

In fact, one the foremost major concerns for the US Government and major CyberSecurity firms are organized "Cyber Attacks" such as a DOS (Denial of Service):  An infection that comes in through one of the methods I will mention below, typically called a BOT and instead of throwing up adds based on your website history (like Malaware), this little software program is what opens the door for malaware, spyware, and very serious malicious tools that can often stay under the radar, install other programs, and consume system resources.  However, it's the scary fact that they can also unknowingly "slave" your computer into doing things without your knowledge!

So, (and this is reality) imagine millions of computers infected with a particular bot that's been waiting like a "sleeper cell" to carry out it's mission, which is not being caught by your Virus/Malware protection since many folks don't scan specifically for this type of threat; They lay dormant, until activated and suddenly the machine is completely taken over (sometimes without the user ever realizing it) and takes over your email account and other programs, and with the army of those other millions computers, brings down an entire website from what I can only liken to a bolt of lightning hitting a transformer.

The good news is that tech insiders and the folks at major cyber security firms, the US Government under Homeland Defense oversees counter cyber threats and ranks the current Cyber threat level.

They could probably be doing more to educate people, but that is a subjective statement at best.  What I believe they do understand is that these type of attacks arguably make up for the biggest threats we face as a nation from a terrorism standpoint and (our entire infrastructure is connected to computers) a work together with industry insiders to combat those who would do us harm and use their knowledge for evil.  (Note to prospective College Students: Forget I/T as a degree, the need for I/T people will reduce significantly over the next few years. Cyber Security is where it is going to be at in this century.)

So, why is this important to you?   It is important, because much like "see something / say something" (fundamentally) we are all responsible for protecting ourselves and making sure we understand the different type of computer related infections, what needs to be done to prevent them, and how the dynamics are changing.  Furthermore, it doesn't have to be difficult or inexpensive!

What types of Malicious Software Should I be Concerned About?

Bots, Warez, Spyware... oh My! 
Well, we've all heard the different terms. Here's a great summery of the different types of infections which are currently out there. Jimmy Ray Purser explains it nicely.


Staying Safe / Methods of Protection / Tips Part 2 (Part 3 will have additional information. You can also contact me for a free assessment)

While there are a ton of software providers out there offering "system cleaners" and "Full Service Protection" at varying pricing levels. As I have mentioned before, for every one of those "paid" services, there are 3 free/alternative to subscription model methods that can minimize your investment.

Firewalls

Don't let a program change your firewall exceptions unless you know for sure it's safe.  Part 3 of this series will have my specific recommendations, but check out this video from Jimmy Ray Purser to find out exactly what a firewall does! 


NOTE:  Beware of pop ups and system cleaners. They are especially untrustworthy in my opinion and are usually downloaded as the result of a fake popup that makes you think your virus/firewall program is warning you!

Email - Email - Email

When you receive an email with pictures in it, that photo is stored on a website and your email program has to go get it. Not only does this open you up to downloading something unintentionally, it's also the way marketers track whether you open, read, delete, or respond to an email.   Set your email program to only download pictures from safe senders (people you trust).

Spoofing/Phishing

Often, because it's easier to create a domain and an email address that looks similar to the real thing, and even post a fake website that looks exactly like the real thing, Spoofs are a huge way to get hacked as they are looking to collect sensitive information by tricking you into filling it out.   Everyone has come close to this I believe, as they look very rule.  If you remember the tips below, you'll be WAY ahead of the game.

   Here is an example of a spoof below (Click on Photo for additional information on spoofing):


CLICK ON PICTURE TO READ ARTICLE 

These are what you want to check:

  • Look at the email header or url (if you clicked to open it):  It may be very close (e.g. mail@facebook.com vs. mail1-facebook31@mail.facebook.net.   Remember, anyone can change the FROM to what they want or setup a domain (e.g. www.faceboo.com - they go after spelling errors often).  If you suspect the email is a spoof, you should contact the institution.
  • Does it say Dear Customer or does it have your first or last name?  Spammers buy email addresses or use programs that just mass send to different variations on domains, so it's rare to get a spoof that says Dear Joe/Jane from a spoofer .  THIS IS ONE OF THE BIGGEST INDICATORS
  • No reputable company will ever ask you for your SSN or CC/Banking Info (And the spammers are wising up to that, which is why they have you go to a fake web page).  
  • Check out sites like SNOPES.com who validates internet fact and fiction  

Downloading and Opening Files

Probably the most common way of getting viruses these days is through downloading a file be it email or via the Internet.

EMAIL

For email, it's pretty well known you don't open any files from anyone you don't know, and never anything that is an executable (like an .exe file).   Also, since people often get their accounts hacked, being vigilant on what you do open is critical.  Always DOWNLOAD the file from the email BEFORE opening and THEN right click to scan with your virus scanner.    (some email programs do this automatically, but it can't hurt.  If you don't know, Google is your friend

WEB

Even I've gotten caught up in this one lately.   Freeware or trial-ware can be a double edge sword, as companies like downloads.com have gone to a system that basically trades you a free program, and tries to slip things like TOOLBARS (Toolbars are virus magnets and completely unnecessary these days)

You can usually find the actual file with some digging but this is again where it's critical to SCAN your file before opening or unzipping.   The download managers even try to give you reasons why they need to be a "middleman" between you and the file that you want.   The trickiest one I've seen was a program where if I didn't click under advanced options (which usually gives you specific things related to the program setup) I would have never seen that the advanced options were INSTALL TOOLBAR, SET MY HOMEPAGE, ETC.

THIS IS THE MOST IMPORTANT ADVICE I CAN GIVE - READ BEFORE YOU DOWNLOAD.  YOU DON'T NEED A TOOL BAR, YOU DON'T NEED TO CHANGE YOUR DEFAULT SEARCH PROVIDER, YOU DON'T NEED ANYTHING EXCEPT WHAT YOU ARE TRYING TO INSTALL


EXAMPLE OF VIRUS INSTALL 


Stay tuned for PART 3:  SimpleAssist Program Tips!








Tuesday, August 13, 2013

"Something's Wrong with My PC/Phone/Mac/Technology"

"Something's Wrong with My PC/Phone/Mac/Technology"


Before you download something from a commercial that promises to clean your PC, check with an expert who can give you a free consult!

For me, realizing how overwhelming it is when working on the varying needs of those customers who sometimes don't really know if there is an answer to their question, or if the question they should be asking make sense!  If you are treated like that, than you are not finding the right person.  .

My real mission is to provide people with a better overall understanding of technology fundementals in order to save money  get the most out of what you have.


How do I know if I have a Virus? 


If your computer is doing things it shouldn't, you may have a virus or some type of malaware!   (Malaware are generally classified as programs that infect the computers to monitor and control the way you shop.  Viruses can do unimaginable things from copying your private access to turning your computer into a "sleeper cell" to attack other machines.

The following is a brief overview of how to identify  protect, insure yourself against viruses and data loss.

CyberSecurity "To pay or not to Pay"  -  
With so many "fix it for $29.95" option available, I hear people asking me constantly "what is safe?" (parents, if you have kids in college looking for a major, cyber security is the one to recommend) or "why are their TV commercials ??   "Will it be more trouble than it's worth?" or my least favorite " It's probably cheaper if I just buy a new machine."

Answer)  Backup your data to an external device or reputable online backup service (such as Carbonite)  Beware of System Doctors / Registry Cleaners / and always TRY before you buy.  There are a myriad of cost effective and even FREE options out there depending on what your problems ares!

This become ever more apparent after some of the more well known companies started trying to "slip the their antivirus software" into another install (Java, Flash), acting like the malawaye creators they are trying to protect their clients from.

Their are the programs out there which are developed by "open-source" programmers which meet or even exceed popular virus scanners such as McAfee (r)  and Norton(R) (among the many whose systems are more expensive and take up significant amounts of previous computer resources; just Google "Free Antivirus" and see the Top 10... but do your homework).  

You are paying for peace of mind, they are paying for market-share.   I'm not saying its all bad, but the beauty of the internet is the ingenuity of those out there who are working for reasons other than money, and a testament to capitalism in and of itself!

The following is not a one-size fits all to repair - it's a represnative piece on the way to think and problem solve a problem.  I am always available to help poin you in the right direction!

.2.  Ok, I'm infected... what do I do!?

A) Disconnect your computer from the internet immediately, and reboot the computer in safe mode (tap F8 while it's booting up.  The first thing to do is reduce the most common denominator  so since the internet is where it came from  disabling the internet for now can only help.


B) The next thing you want to do is sign off the computer and when the startup screen starts popping up, tap F8 repeatedly for additional options and boot in SAFE MODE.  At this point, run your virus scan and see what it does.  If it cleans the files, then start in SAFE MODE WITH NETWORKING and try duplicating the problem.  

C)  Once you know where you stand, you'll be in a much better position to know you have to do.  Chances are, you have to disable a few tool bars, uninstall some programs, and make some small changes.   However, a full diagnostic is highly recommend by someone who knows what they are looking for.  If your computer is DOA, usually the worst case scenario because system files were corrupted by the  virus and reinstalling the OS will overwrites them system.

 However, while it won't likely come to this, don't worry if it does:   this procedure only makes you reinstall your software but does not remove your exiting data!   Even if you don't know all of your license keys to reinstall some  programs, there are tools out there like Magic Jelly Bean that can help you find them.  

D)  From a safe computer, begin changing your passwords.   Remember, viruses and malaware record Keystrokes!


Additional Measures

Even if you are the most elementary user of technology, I can give you some hints on what is available, proven, and inexpensive to keep your computer safe.  There are fundamental things to understand to realize how you get viruses, how they can hurt you, and how you can prevent them from happening again.

Eventually, I'll be able to post more of these online but for now, I invite you to read something I put together during a complicated virus removal..

A “Non Techie” Guide to Disabling Java and Removing Possible Viruses:  http://bit.ly/1d23LeE

I am also at your service anytime, and I invite you to ask for a SimpleAssist:  518.290.7079 or 845.430.7650. 

Best Regards,

DPS