Showing posts with label Computer Viruses and Malware. Show all posts
Showing posts with label Computer Viruses and Malware. Show all posts

Thursday, February 19, 2015

SimpleAssist LifeSync Spotlight: The "App" Universe, it's Benefits, and Death of the "Web-Browser"


App Consciousness:  Staying Safe and Streamlined with the "New Way" of Computing


Do you sometimes find it easier to use an App on your mobile device, vs. a web-page?

I was reminded of this today when my #smartphone powered down, and I was forced to fire up the laptop to continue the conversation I was having in the #FaceBookmessenger App.
While using the #facebook web-page for messaging, I remembered, "Even on the PC, there's an App for that.”
During conversations with clients, I discovered many are not aware of the benefit gained from approaching the tools used on the Internet through an App, rather than a web-based browser.  

What do I mean by App?



  • An App (short for application) is a self-contained program that usually relies on the Internet thereby reducing the demand on hardware.
  • An App is typically offered through an "App Store" from an Operating System such as #Android, #iOS, #Blackberry, etc.
  • All Apps require a high level of quality from software developers, ensuring stringent standards and rigorous safety guidelines. 


Apps and Devices

Most of us still use Desktops/Laptops internet browsers, and experience the internet differently based on whether we are using an App or a web-browser (such as Fox, Internet Explorer, etc.).

When using a web-page, you are using one program (the web-browser) to access programs and sites that vary in design, security, programming languages etc.
When using an App, you are using a specific program required to ensure strict standards and stringent safety guidelines.  Providing a consistent experience for users on different browsers; each App with its own rigid requirements
Consequently, you lose the added benefit of an Apps Store, which require those software tools above to provide a consistent experience for users on different browsers; all with their own requirements, and potential security risks.
Finally, software developers must design their websites using a variety of tools, where there are many more "options" [potential pitfalls] while a user is browsing the web.


It's Murphy's Law

Have you ever wondered why your smartphone is rarely plagued with a virus, and why it's easier to do things on a tablet or smartphone than it is on the computer?

The answer is simple: An App offers a more controlled environment with less potential to trigger something that would cause an infection.  


On the other hand, when you use a
web-page, you are using one program (a browser) to access different sites and programs, each varying in design, security, programming languages that increase the potential of Malware.

What is Malware?

·         Malware is malicious code that has subverted the security of the devices, and varies in severity and risk to the user.

·         Most malware typically (at minimum) circumvents the safe guards of the system for the purpose of gathering sensitive information, targeting unsolicited advertising, or opening the device to further infection or malicious uses.

·         Spoof emails are another type of delivery system for malware, inciting the user to initiate an action which can install malicious code that can give hackers control of your machine without your knowledge, or with express purpose of collecting your identity by mimicking legitimate persons or organizations such as your financial institution, the FBI, something you are familiar and often looking exactly like the real thing.

·         As most desktop owners are aware, several additional "plugins" are required for a consistent experience with Web-Browsers, such as #Java, #Flash, #Silverlight).Every computer I work on has antivirus/anti-malware program to identify potential infections.

·         Most infections are triggered by an action by the user, the overall point is:

Regardless of how good your security system is, there are exponentially more landmines to fall into using a web-browser vs. an App.

Other Considerations

This is not to say using the internet via a web-browser is bad, and doesn't offer its own virtues.

As the explosion of the App continues, we currently caught in the middle between the old way of doing things with one foot in each world between old and new.

We generally consider a matter of convenience, a security concern, or becoming more acclimated with the trend of technology and the fundamental role it plays in our society.

As more and more vendors scramble to offer these services, I am using examples based on my own personal preference.   As a technology consultant, I am fluent and match software to the needs of my customer.  

Here are few suggestions you can use to shift to an App mindset as you do with your mobile devices to take advantage of the seamless user experience and safety between all of your devices.

THE APP STORE - BEYOND MOBILE        

Chrome Appse -  Apps instead off Bookmarks
Chrome Web-Store - Facebook

Download



  1.  Download a Browser or Operating System that allows you to Install Apps

  •  Google Chrome has been the pioneer in cloud-computing (Internet-Based Software Development). The Google Chrome Web-Browser is much more than just an internet browser, and I often liken it to a self-contained operating system.
  • What's the other advantage?  With Chrome, you can use your current email address or create a free Gmail address to keep all of your bookmarks, history, and saved passwords synchronized across all your devices
  • Chrome for Desktop has the Chrome Web App Store which enables you to install Apps, and even start them right from your desktop. This means instead of having to visit a web-page, just as you would on your mobile device, you launch an application offering a cleaner, and synchronized, user experience.
  • Google Chrome has a great selection (such as Facebook messenger, the inspiration for this post)

Upgrade



2. Upgrade to the O/S that supports Apps

  •  #Windows8.1 is a hybrid operating system.
  • A Hybrid Operating System is designed for both the old school and new school approach.
  • This system works on both regular desktop/laptop computers, as well as tablets and other mobile devices.
  • Windows8.1 has been developed to run on minimal resources!
  • It is an operating system that offers you both old school (web-based) new school approaches (App-based).
  • Windows 8.1 has the classic windows desktop







And a Metro menu.









      Apple is another company that is way ahead of its time. Despite my problem with the way they charge their customer, they the masters of elegance with their interface and the most recent versions of their OSX mirror functionality with their mobile iOS Operating Systems.   

Less Can Do More


The need for powerful hardware is actually reducing, a dramatic shift since the mobile device explosion.  Since software developers need to develop apps to run on these tiny mobile devices, and these applications are becoming available across

Before you buy new


Before you are convinced that you need to buy a new PC or MAC every few years, due your due diligence.

  •         Can it be cleaned or reloaded?
  •         Will a lighter O/S (like Windows 8.1) allow you
  •          If your computer is acting slow, maybe it just needs to be serviced (the result of       these inherent issues I mention before).
  • .      Even if your computer is a few years old, it's likely much more powerful than your mobile device.  



This is one of the strongest pieces of advice I offer my clients.

It all comes down to the software, and since developers are writing applications for mobile devices, the need for powerful hardware is greatly reduced.

In short, back in the day a web-browser was the primary way that people interacted with online resources and the primary "vehicle" to the #internet;.

However, with the rise of tablets and smartphones today's users are more inclined to use an "app", downloading an application from an App Store which is specifically tailored towards whatever the App is offering (e.g. you likely don't use your mobile based browser to check your email or do your banking. You download appropriate application.


In short, back in the day a web-browser was the primary way that people interacted with online resources and the primary "vehicle" to the #internet;. However, with the rise of tablets and smartphones today's users are more inclined to use an "app", downloading an application from an App Store which is specifically tailored towards whatever the app is offering (e.g. you likely don't use your mobile based browser to check your email or do your banking. You download appropriate application.


While this may all seem like lot of information, the short of it is that the speed of innovation with technology is outpacing the collective ability of the masses to keep up, collectively. Understanding the way the wind is blowing is now a necessary evil, as technology becomes more intertwined with our daily lives.

If you are looking a technology partner to help find ways to leverage technology for your home and/or business, visit www.simpleassistme,com. .



Tuesday, December 2, 2014

SimpleAssist Technology Phone Scam Alert


Telephone Scam - Beware!

NOTE: More informatiom will be forthcoming, including the audio of the conversation.  Stay tuned, however for now if anyone calls you saying they are associated with @Microsoft, advising that they are a #Microsoftpartner we advise that you ask for a call back number and contac us at helpme@simpleassistme.com or 518.290.7079

Yesterday morning I received a call from a company claiming that they were partners with #Microsoft and they had information leading them to believe my IP address was hacked. 

This wasn't the first time this situation had happened.  In 2014  someone in our neighborhood in #upstateny was regularly receiving similar type calls and was ultimately #hacked AND charged $500.00 when they masqueraded as legit Microsoft technicians. They hired @SimpleAssist me, and oneThey attempted to continue contacting the family  until I happened to be there one day. 

In both instances, they were very convincing however when I explained that I was a Microsoft partner,  they persisted.  It was not until I asked them some technical questions and advised my background, asking them for their contact info and details on Microsoft partner program that they did what I expected and they immediately disconnected the call.-

A few minutes ago I  received a call from a customer who recently experienced a similar call and filed a police report.  the same scenario

Obviously with all the consumer demand for holiday deals, awareness is Paramount so the purpose of this bulletin to advise readers and followers of SimpleAssist to not give ANY info to someone calling you saying you have been compromised before verifying. Doing so would allow the hacker to correlate.  More information will follow shortly. 

Here is a Microsoft bulletin on phone scams. 

  http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx

NOTE:  An audio example of the recorded conversation will be posted shortly

Monday, March 31, 2014

Windows XP users - April 8th “End of Life” Deadline - SimpleAssist Blog Guide Coming Soon (and Why It’s Important)



As a continuation to an earlier Facebook post, and in an effort to help those make sense and make the best decision possible for their needs, a tip guide is forthcoming on the SimpleAssist blog (simpleassistme.blogspot.com).  It will offer a roadmap to disseminate all information, rumors,  breakdown of several different recommendations in anticipation of what to expect before and after the Windows XP April 8 deadline.   The most important concern is security and the biggest question will likely be, “do I need a new computer or can I upgrade my own” as outlined below.
                                                                                                        

Tuesday, March 4, 2014

SimpleAssist Tips - Download Danger: Protecting Against Malware as theCrooks Get Smarter

Internet Safety and Security


This tech tip includes both an anecdotal less on how I was nearly fooled by a clever spyware delivery system, and some some suggestions for protecting yourself.

Getting Duped:  Malware Maleficence

                                       
I recently noticed a creative delivery system for "fooling" the end-user into installing potentially malicious code onto their computer when attempting to download install applications such as driver packages, freeware programs, self-computer optimizers, and various other utilities.   

A few days ago, while in search of a piece of software for diagnostic purposes, I nearly fell into a trap not unlike those I advise my clients to be wary of.  Following a quick online search, I noticed several search results from websites with links to program I was looking for.

After clicking the link for a site that I have trusted, and then navigating through the page trying to find the direct download link and avoiding the “adver-teasers”: one of my terms for integrated graphic links that say DOWNLOAD and are made to look like legitimate download links (done using a little trick called “Re-marketing” where cookies associated with your searches are picked up by the code displaying the ads), I found the correct download link and proceeded forward. 

While the file included a download manager be wary of prompts  to install other products, especially if it is NOT from the developer themselves) I concluded it was safe since they had proved trustworthy in the past, and the download manager did in-fact appear to include the freeware I was intending to use. 

Upon selecting the "download and save" option (always a good idea) , and then scanning the file with my antivirus and malware by right clicking on the file download, I believed that all seemed well and continued to execute the installation. 

IMAGE EXAMPLE 1
Example of Program Adware Installer Menu Trick (See Image Example 1)

CLICK to INSTALL: Standard / Typical – Installs the standard options for this program

CLICK to INSTALL: Custom / Advanced - Warning, this is for Advanced Users only

Initially, I had selected the STANDARD option (I was working quickly) and fortunately realized I was going against instinct and decided to go back to CUSTOM/ADVANCED option, as I usually do.

It was here that I noticed that something I had not run into before, and could likely cause problems for others. (It's hard when  Adobe and Flash try to get you to click on additional software options, but at least they allow you to see t)

Shockingly, had I proceeded with the STANDARD installation, the critical mistake of not seeing the cleverly hidden and preselected checkboxes which would have authorized the installation of the following:

·        A toolbar (Wide open door for spyware)
·        The option reset my browser’s my home page
·        The installation of a completely unrelated program

In other words, although the STANDARD  / TYPICAL installer did include the software I needed, the website where I had obtained the file was relying on something that I have noticed in my professional experience, which is: 

 Most everyday users do not consider themselves ‘Advanced” computer users, and are  therefore often hesitant to choose an option that indicates as such... for fear of doing something wrong.

 While the clever approach caught me off guard, I was extremely disappointed that a site supposedly providing  legitatmate software would find a loophool to “fool” unsuspecting users into downloading potentially malicious code that would leave them vulernable to more adware, viruses, and problems. 

Ways to Stay Safe When Installing from the Internet



1.      Protect yourself / understand what you’re up against

While the most important thing you can do is to protect yourself, and follow the old instinct “if it’s too good to be true, it probably is”.  Having specialized software to  protect your machine is a critical component.  There are plenty of great free software programs that can do the job of paid “subscription based” tools that are legit or have free versions that will get the job done.

First things first however... know what to look for by familiarizing yourself with these terms. [Broader definitions available by clicking link]

I.           Adware – software that displays advertisements and is integrated into another program offered at no charge or at low cost or a type of spyware that gathers information about an Internet user's browsing habits and displays targeted or contextual advertisements.

II.         Malware - software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation

III.      Toolbars - row or rows of buttons on a display screen that are clicked on to select various functions in a software application or web browser shopping-add ins, etc.

IV.       Anti-Malware Software – Antivirusanti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackersransomwarekeyloggersbackdoorsrootkitstrojan horsesworms, malicious LSPsdialersfraudtoolsadware and spyware

2.      Searching “safe” for Software, Driver, and other applications


When searching for software, drivers, manuals and more, vigilance is key. When using a popular site such as Google® or Bing®, it’s good to remember that those site’s use “crawlers” and other factors to aggregate and order the listings.  Being as specific as possible, and starting with the name of the manufacturer (e.g.) Microsoft
.


I.                   Even if you know exactly what you are searching for, skim the search for the other sites that appear.  Check the URL (see image 1) on the search screen to make sure the link includes the name of the developer.  Note, additional sites may have altered or out of date versions of what you are looking for, AND may even have a higher search ranking; making them appear “safer” or, (as is more frequent) be in a prime position up in the sponsored search area at the very top and on the side of the screen. 

II.                 If you don’t know the exact source of what you seek, what you use for querying   is as important as how you search.  For example, if I wanted to find legit free anintivirus software like “Top 10 free antivirus programs” , I would cross reference   blogs or legitimate sites, using a systrem of elimination that points in the right direction.

III.              Usiing advanced search methods (I hyperlinked as that is another blog itself.  So in looking for a virus program, I may use Microsoft + Antivirus + Download and Do multiple searches to find blogs, such as this one where you can find  direct links to the download, instead of having to go through some sort of download manager.  

3.     Due Diligence


It is worth noting that no matter how good your antivirus and malware protection may be, it’s not difficult for something to get by you by making you feel as if it’s legitimate.  I call it a Cyber-Con, and that’s really the gist of it. 

Again, people are infected with malicious code with they let their guard down, having faith that if they are installing something they trust, or from somewhere that they trust, additional options must be safe too.  It’s always keen to remember that free software isn’t really free (unless it’s open source, but that’s a different discussion) and it’s being supplemented by tying in advertising of some sort. 

Depending on what you are looking for, there are potentially hundreds of sites, mirrors, etc. that have or claim to have software application, drivers, etc. available from a central resource.  
My general rule of thumb is that if I am prompted to download something that is unsolicited (a toolbar, a free virus program, a download manager) then I am going to strip the options down to get only what I need

Even legit websites will have options to “Install toolbars” or other options unrelated to the primary purpose of the utility (Java® and Flash® both have check boxes that need to be unchecked prior to initial download.   
Overall, it pays to be safe.  As one who is constantly seeing the havoc created on the other end of cleaning the viruses out, a little education always goes a long way.  I will always enjoy sharing what I have learned in order to keep other people safe, as I’d much rather be developing strategic marketing and business development strategies than cleaning computers. J

In all seriousness, if you play it safe, search smart, and ask when in doubt, you likely won’t need to buy your next computer as soon as you think you do and you’ll find that a little homework goes a long way.

Derek Shocklee

About the Author

Derek Shocklee is the Founder of SimpleAssistme.com, a business technology and strategic consulting, computer repair, and advisement firm focused on helping business and individual leverage technology in a fast paced 21st century landscape.