Wednesday 22 April 2015

Online security threats today

With today new technology comes new threat like Viruses, Malware ,honey-potting, Denial of service  these are just some of the threats to businesses and home computer user who use the internet.






Beware of online threats


this blog will tell you all about online threats to you and your business.

 

 

 

 

 

 

 

 

 



What is Honeypoting in (Computing) –?

Honeypot is a trap set to detect or deflect or in some matter counteract attempts at unauthorized use of information systems. Also it is a security resource who’s values lies in being probed or attacked or compromised. This maybe legal but Honeypoting can be manipulated to work for the person in acquiring their personal details.
 They are loads of different honeypots just to name a few
Production honeypot- are easy to use they capture only limited information and are used primarily by companies or corporations. Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security. Normally, production honeypots are low-interaction honeypots, which are easier to deploy. They give less information about the attacks or attackers than research honeypots do.
Pure honeypots- are full-fledged production systems. The activities of the attacker are monitored by using a casual tap that has been installed on the honeypot's link to the network. No other software needs to be installed. Even though a pure honeypot is useful, stealthiness of the defense mechanisms can be ensured by a more controlled mechanism.
Research honeypots- Are run to gather information about the motives and tactics of the black hat community targeting different networks. These honeypots do not add direct value to a specific organization instead they are used to research the threats that organizations face to learn how to better protect themselves.
 


click the link below for real stories in Honeypoting.
 
 
 
 
 
 
 
 
 
 
 
 
 

Malware? what is it

Beware  I am malware

What is malware well malware is a Software used to disrupt computer operation and gather sensitive information or even gain access to a private computer systems. Malware may be stealthy intended to steal information or spy on the computer user for a period of time without them knowing this is happening.

Malware threats 2015

 Security experts have been banging the drum about the threat of mobile malware for years. The fact that it hasn’t yet materialized in a major attack has eroded the credibility of the claims, though, which means many users don’t take it seriously and have let their guard down. The sheer volume of mobile devices, and the prevalence of new mobile malware threats only increase the likelihood that a major mobile malware attack will happen. Will 2015 finally be the year? 

 

 

 

 



 Real story of a malware attack click link below
http://www.dailymail.co.uk/news/article-2534153/Millions-visitors-Yahoo-com-hit-huge-malware-attack.html

What is Phishing?


 Phishing is a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, on-line.



This is a website about a real story of Phishing scam
click this to view

http://www.nbcnews.com/id/46789454/ns/technology_and_science-security/t/phishing-gang-steals-victims-life-savings-m/#.VRKDxE9ybcs


Viruses,Trojans and Worms

Virus- this is a malicious program is a executable program that can reproduce itself it does need you to click anything but it needs you  to execute it. Just running these files can make it spread throughout the system.


Worms- Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and Trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable.one installed on a computer the worm spontaneously generate additional email messages containing copies of the worm. They may also open TCP ports to create network security loop holes for other applications and they attempt to flood the LAN with spurious Denial of Service.





Trojans-A Trojan is a self-contained, malicious program  that is, it's a bit of software code that does something bad to your computer. It doesn't replicate  the same as a worm would, and does not infect other files like a Virus. However  Trojans are often grouped together with viruses and worms, because they can have the same kind of harmful effect.

Here is a list of the worst viruses out their

Boot sector- this is applied to the boot information used by any operating system.
Browser Hijacker- this type of virus can spread itself in numerous ways including voluntary download effectively hijacks certain browsers usually in the form of directing the user to particular sites.
File Infector Virus- this is the most common of the viruses the file infector takes root in the host file and then begins its operation when the file is executed.
Macro virus- these are usually associated with my applications like Excel or any other application that supports the use of a Macro. they use special actions that programmed into the document. the most well know macro virus was called Melissa this was a word document that contained password to pornographic websites.
Resident Virus- This virus definition applies to any virus that inserts itself into the memory and therefore only takes action when the infected file is executed.

Virus update of new viruses 2015 3/06/15
hers is a list of viruses to look out for
 ios oneclickfraud-Trojan
Linux mouse- Trojan/worm
Backdoor   Waketagat - Trojan
 Sonar SuspBeh!Gen 580- Trojan/Worm/virus                                                                                        




















What is Denial of Service?



 








A denial of service (Dos) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services.