ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

IDENTIFY VIRUS ALERT

Updated on November 17, 2012

IDENTIFY VIRUS WARNING AND TIPS TO ENSURE YOUR SAFETY

INTRODUCTION

Do you trust the websites that you visit regularly? Malware developers hope so, because if the browser displays a warning on a known page, few users believe that there is a virus and ignore the warning. Attacks on well known sites show that this trust can be dangerous. About 500,000 websites were victims of an attack that infiltrated dangerous malicious codes into the sites, including a few podcasts on iTunes.

Even in other cases, the malware developers targeted the innocence of the users. In addition to the perennial issue of phishing mails, attackers are now concentrating on two emerging markets in particular: social networking sites and smartphone apps. Yet only a few users believe that posts from their Facebook friends could be dangerous. However, new attacks are seen every day that are out to get the personal data of the users. Also, the number of apps in the App-store and in particular in the Android market that spy on cell phone data or rip off users is increasing rapidly.

On the other hand, browsers and operating systems confront the user time with similar harmless and false warnings.However, if you look at the right place and with the right tools, you will find the solution in no time.In this hub,i am writing about some security threats and Virus alerts.how do they come? and how to ensure your safety?

ATTACKS FROM HACKED WEBSITES

Attackers are increasingly using reliable sites to spread malware. The latest example: the aforementioned attack on about half a million websites, which became famous as the LizaMoon attack. Via SQL Mass Injection, hackers infiltrated codes into the sites that automatically forwarded you to a page that hosted the malware. Most of these forwardings led to the domain lizamoon.com – hence the name.

A similar attack affected about 114,000 sites in June last year. Exactly like that attack, the LizaMoon targeted sites that used the Microsoft server platform IIS and the content development technology ASP.net.

The malware packets on the target sites of the redirects specifically search for un-patched loopholes in the browser, the plug-ins or even in Windows. These are often Trojans that spy on the data or rogueware programs.

Even if the browser or virus scanner displays a warning, users rarely expect an attack on known sites. One would barely notice this, since it is usually run in the background. Therefore, you should always update the virus scanner, the browser and its plug-ins so as to rectify the security loopholes as properly as possible. With the Firefox add-on NoScript, you can also regulate the execution of active elements and block embedded scripts. Sometimes, the site itself is not the problem, but the contents on the page added via iFrame. Hence, after installing NoScript, use the icon next to the URL line to go to ‘Settings | Embedded Objects’ and activate the ‘Ban <IFRAME>’ function there.

INCORRECT VIRUS DETECTION

Warnings from the Windows Stability Center should be taken seriously, right? It is better if you don’t because the tool is an unreliable security program (rogueware) that wants to deceive you with fake warnings. It mostly originates from websites that initially generate a seemingly real virus warning in the browser using a JavaScript. If you click ‘Remove viruses’ or similar buttons, an unreliable virus scanner that is most often difficult to remove is downloaded; for instance the Windows Stability Center. Even this displays incorrect results again and offers the user the solution - a paid, but of course, completely useless pro version.

Do not buy the tool. At first glance, the warnings seem threatening, but if you take a look at it again, the unusually large number of viruses that have been found should make you suspicious. You should generally install only reliable, well-known antivirus programs. If you see such a false alarm, check your computer thoroughly. The Remove Fake Antivirus tool can be used to find and remove the most common samples. You can find the tool at ‘http://www.softpedia.com/get/Antivirus/Remove-Fake-Antivirus.shtml

Despite original logos or seemingly real Windows messages, one can recognize such extortion attempts. Rare business practices (Windows activation solely via foreign telephone numbers), misspellings, email addresses that do not refer to an official domain, or anonymous payment methods indicate the scam. But even those who do not pay must still disinfect the computer. Since the system accesses in Windows are usually completely blocked, only a restart and system check with the live CD of the antivirus program helps. If this also does not help, the only remaining option is to reinstall Windows.

ALLURING FACEBOOK LINKS

Fraudulent content spreads rapidly on Facebook. The reason: many users simply click contents, which have allegedly come from their friends. The harmless variant of this so-called Facebook scam is videos that promise celebrity sensations, violence, or sex. If you click such a video link, the contents are posted on the user profile via a hidden ‘Like’ button. Advertising companies are behind this most of the time and earn money with every click. However, Apps are more dangerous; for instance, they promise you that you will be able to see all the people who visit your profile - something that is not possible on Facebook. Such apps forward the user data without permission or even steal passwords and infect the computers with malware.

You can quickly identify the suspicious videos on strange links such as chalaepic.zapto.org. In Apps, you should pay close attention to the data they use. You can delete already registered Apps in ‘Account | Privacy settings | Apps and Websites | Edit settings’. For safety, you should set a new password after each scam attack. You can do this in ‘Account | Account settings | Password | Change’.

DECEIVING APPS FOR SMARTPHONE

The applications in the App-stores for iOS or Android are not always as harmless as they appear. With free apps in particular, it is possible that you click an ad banner and subscribe to something by mistake that is automatically billed to your phone bill. Smartphone viruses are worse.

In March, hackers infected more than 50 Android apps with the malware DroidDream, including Photo Editor, Super Guitar Solo and Best Password Safe. In four days, the Apps were downloaded 50,000 times according to Panda. Once installed, such viruses can read the data, send expensive SMSs automatically and activate administrator rights and thus download more malware.

Antivirus apps for the smartphone prevent such attacks. A sleek and effective solution is AVG Antivirus Free (free of charge in the Android market). After installing an app, you should also check in the application information whether it is accessing your messages or browser history; this is typical of hackers and spies. However, if you find unusual entries in the bill, complain about this to the provider. Nevertheless, you must hope for fairness because it is very difficult to prove that you unintentionally subscribed to something.

PROFESSIONAL PHISHING

Phishing sites spread via email are once again increasing: According to Symantec, the number of phishing mails rose by 50 percent from January to February. The mails link you to professionally recreated banking sites, where you are asked to enter your log-in data.

Always enter the web addresses of banks, shops or payment services manually or invoke them via bookmarks. Remember that banks never send such mails. Ensure that the bank and payment service websites use https links because only then are they really safe. Unusual domains such as paypaldeb.com are also suspicious. Click other links or sub-pages and they do not work in most cases. If you receive an error message when entering the access data and have to re-enter it, this could also be a trick. With this, attackers want to hack other accounts as well.

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)