Sunday, February 8, 2009

A review on a post on Internet Security from My E-Commerce blog

After a review on Internet Security Threats- Its Changing Faces ( Part 2) from My E-Commerce blog, I'm sure that most of you have ever encountered with Trojan especially when you're using pendrive in UTAR. So now I would like to explain more about Trojan and some others security threats that's not detaily elaborated in the blog.


A destructive program that attact users of computers. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The Trojans can escape from conventional protective anti-virus software and firewalls.



A number of open source and modified Trojans, altered to avoid anti-virus detection, have been used. Or, the e-mails are sent to specific or targeted recipients. Unlike ”phishing” attacks, the e-mails use subject lines often referring to work or other subjects that the recipient would find relevant. The e-mails containing the dangerous attachments, or links to web sites hosting Trojan files are spoofed, making it appear to come from a colleague or reliable party. When opened, the file or link installs the Trojan which can be configured to transmit information to a remote attacker using ports assigned to a common service.

Next, a rootkit allows someone, either legitimate or malicious, to maintain command and control over a computer system, without the the computer system user knowing about it. This means that the owner of the rootkit is capable of executing files and changing system configurations on the target machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage.


Other than the prevention stated in My E-Commerce blog,you must make sure that your computers are up-to-date with security software updates; make sure you have installed, and are using the latest version of anti-virus software; keep your operating system and Microsoft Office software up-to-date; be suspicious of email messages and other electronic communications from sources you do not know or recognize; or do not ever open email attachment from unknown sources. I strongly recommend Kaspersky as it manages to give a strong and reliable protection.Click here for more detailed prevention.

Useful links:

1) Hackers using YouTube to spread latest Trojan threat, dubbed Fake Codec

2) Window Live OneCare

3) Threat of Exposure

No comments:

Post a Comment