Attacks on 5G
The move to 5G is predicted to exacerbate threats to the telecom industry as 5G’s architectural features open up opportunities for new types of attacks on carriers’ networks. At the same time, according to Positive Technologies experts, during the transition period, when networks of previous generations will still be used for voice calls and SMS, all the shortcomings of their protection will be relevant for 5G subscribers for a long time.
With the development of artificial intelligence technologies and neural networks, attackers will be able to create a variety of information fakes – deepfakes, which can be used both to bypass biometric identification and to deceive the public and other purposes.
Supply chain attacks on the rise
The growth of attacks on supply chains was predicted in 2019, and this forecast remains relevant. Typically, attackers inject malware into the legitimate code of software developers, which then spreads to the victims. Trend Micro does not exclude that in 2020 MSSP providers may turn out to be a similar channel of infection for the organizations they serve, being compromised.
The rise of attacks using stolen credentials (Credential stuffing)
According to Chronicle experts, numerous data breaches that took place in 2019 will lead to the active use of this data to carry out attacks. With the increase in the amount of data available, stolen data substitution attacks will become an increasingly viable method of monetizing for attackers.
Attacks on devices and equipment, not windows machines
The focus of cybercriminals is shifting from personal computers to various IoT (Internet of Things) devices, network equipment, cameras, drones, etc. Avast predicts that cybercriminals will add sophisticated protection to malware targeting such devices, making them harder to detect and analyze, similar to how they protect malicious code on Windows. With the growing popularity of smart devices, the surface of IoT attacks will expand.
Growth of attacks on clouds
Active cloud migration creates new security risks. Corporate data stored in cloud services will increasingly become the target of malicious attacks that can be accessed through code injection attacks – deserialization errors, cross-site scripting, and SQL injection, Trend Micro predicts.
Increased complexity of attack methods
Experts unequivocally say that cybercriminals will become smarter and more sophisticated. McAfee is talking about a possible transition of attackers to two-stage campaigns using ransomware. It is also predicted that attackers will output data from infected devices using non-standard methods, for example, via signaling data or via Wi-Fi/4G connections.
In 2020, a significant increase in all types of attacks against RDP (Remote Desktop Protocol) is expected. Cybercriminals will be able to take advantage of poorly configured servers with RDP or exploit protocol vulnerabilities, depending on what is more profitable for them, according to Avast.
Attacks on critical infrastructure
There will be more attacks on critical infrastructure – experts from Group-IB, Trend Micro and Chronicle agree on this. Industrial espionage, traditional malware or ransomware attacks, supply chain attacks – the options vary. Attacks are expected both on energy enterprises, industrial systems, and life support systems and on government resources.
Development of cyber services for sale
Cyber service schemes for sale will evolve, gain momentum, and take on new forms, say Positive Technologies experts. For example, a scheme may become very popular when some attackers break into the infrastructure of companies and penetrate the internal network, and then sell or lease it to other participants in the shadow market (access as a service model).
Picture Credit: Unsplash
So, how can you clean a USB flash drive from viruses?
1) Checking a flash drive using an alternative antivirus
To begin you can use some kind of antivirus that does not need to be installed (they are also called scanners, online scanners).
It is enough to download such products to your PC and run a system check. They can work in parallel with your installed antivirus and will not interfere with it in any way.
What to choose:
- ESET’s Free Online Scanner is an anti-virus utility that does not need to be installed. Allows you to run an anti-virus system scan in a matter of minutes (including selecting any disks, flash drives, memory cards to scan).
- McAfee Security Scan Plus is a very famous software for quick scanning of your computer. It can work in parallel with your installed antivirus (there is no point in removing it after checking).
2) Check with special utilities
No matter how good your regular antivirus is (if it is installed on the system), it cannot “see” and recognize some types of threats (for example, adware, AdWare, SpyWare, TrojanSpy, TrojanDownloader, etc.).
To check your system and flash drive, you must use special utilities.
3) The radical way: formatting the drive
Another way to completely remove viruses from a flash drive (and with them all files from it, be careful!) is to format the drive.
To start formatting, just open “My Computer”, right-click on the flash drive and select “Format …” from the menu.
4) Prevention: how to protect yourself from a new virus
- Install one of the modern antiviruses on the system, and update it regularly.
- Configure your system so that auto-launch of applications from plug-in CD/DVD and USB drives is disabled.
- If as you work, you often have to connect your USB flash drive to other computers, then before opening any files from it on your system, check it for viruses.
- Those documents that you carry on a flash drive would not be superfluous to have on your hard disk (such a copy can help if the flash drive is lost, or the virus irrevocably spoils the files on it).
Picture Credit: Unsplash
If you do not have a full-fledged antivirus on your computer, or you want to double-check its performance, then one of the best solutions is to use online antivirus.
This antivirus can work in three main areas:
- check the specific file that you upload to them in the service;
- check the suspicious link (which you want to follow, but are afraid);
- check fully the system and all your drives displayed in Windows.
However, it is impossible to verify the system completely with just one site (because for security reasons sites are not allowed to access your drives)!
But online antivirus has a client, after downloading which, you only need to run it and agree to the scan (it does not need to be installed, registered, configured, updated, etc.), which is convenient and saves a lot of time.
Very powerful and simple scanner from the notorious company ESET. Designed not only to remove classic viruses but also to potentially dangerous software.
The product is completely free, it works immediately after launch. Special settings do not require. The client weighs only about 6 MB, which allows it to be downloaded even to a PC where there is no high-speed Internet access.
To start a system scan, just download and run a 512 KB file! Then your system and memory will be automatically checked and cleaned of malicious elements.
The utility works fully automatically! Its one of the fastest means of checking your PC: from the moment you go to the developer’s site to the start of the scan, it will take no more than 10 seconds!
A product from the famous manufacturer Trend Micro. Allows you to quickly check any drives, flash drives, system, memory, etc. for the presence of malicious elements: viruses, trojans, adware.
In the settings, you can specify a specific drive for verification. After scanning and cleaning your system, the program automatically “collapses” and leaves no traces in Windows.
A very good product from a renowned manufacturer. Allows you to run an anti-virus scan of your computer for malware in a matter of seconds.
In addition, the program will check your current security and inform you, if there is a problem with your current antivirus, is it configured correctly, whether the database updates, firewall settings, etc.
Picture Credit: Unsplash
It is worth noting that all antivirus programs in this list are completely free and, above all, safe. The list of the best antivirus programs changes regularly, as developers change and improve something every time, and sometimes completely refuse to provide services for free.
It should be noted that all of these antiviruses have paid versions. We did not consider them. The selection includes only free solutions without time limits. In other words, selected antivirus that does not ask for payment after a few weeks or months of use.
Avira Free Antivirus
Avira Free Antivirus is a comprehensive solution for protecting your computer from any malware. The complex checks not only files, but also potentially dangerous Internet connections, and thanks to the extension for popular browsers – even malicious websites.
The best part is that Avira doesn’t put a lot of strain on your computer. After installing a full set of security, the computer does not begin to spend 90% of its resources to support the life of the antivirus, which is especially important for owners of budget computers and laptops.
AVG AntiVirus Free
AVG AntiVirus Free is an excellent antivirus, the developers of which have made the main bet on protection against phishing. And this is very commendable. Despite the increase in computer literacy, more and more Internet users are becoming victims of phishing attacks. By installing AVG, you will most likely protect yourself from scammers.
However, both regular viruses and Trojans are successfully detected by the antivirus – the database is updated regularly. The only downside to AVG is the forced installation of the extension for the AVG SafePrice browser. If you are installing AVG, be sure to keep this in mind and remove the extension if necessary.
Panda Free Antivirus
Panda Free Antivirus is very different from most other antivirus programs. First of all, the interface. Here it is unusual but attractive and easy to use.
Panda has a built-in free VPN – a trifle, but nice. But the main thing, Panda has a special emergency mode. It is activated if the computer has been affected by viruses or by the user and has stopped turning on. In this case, the antivirus allows you to perform a recovery.
Avast Free Antivirus
One of the best free antivirus Avast is not going through the best of times. This is largely due to the fact that the antivirus has become frequent and intrusive to request the transition to the paid version. Of course, not everyone likes it.
However, like an antivirus, Avast is still good and as easy to use as possible. The user only needs to give permission to conduct intelligent scanning once in a certain period of time and that’s it. Then Avast will figure it out itself, including it will automatically and quietly check files for potential threats in real-time. Another plus of Avast is a large number of additional features.
Picture Credit: Unsplash
Corporations are faced with the need to transfer the maximum number of employees to remote work. This causes a huge number of problems, both hardware, and software. Employers do not want to lose control over the process, so they are trying to adopt tools for remote monitoring.
The outbreak of coronavirus has shown that the most effective means of combating its spread is the mutual isolation of people. They try to send the staff of the company home, the nature of the job duties of some specialists allows them to remain involved in labor activities. Here another problem arises: the employer does not have many ways to control the employee’s work regime when he is at home.
According to Bloomberg, in recent weeks, in connection with the mass transfer of employees to remote work, the demand for special software to monitor their activities has tripled. Distributors and developers of special programs literally can not cope with the influx of orders. Many of these utilities, after installing a remote employee on a computer, allow you to control his actions, stop attempts to unauthorized distribution of confidential information, and also evaluate labor productivity.
As a temporary solution, some employers try to force employees to spend a lot of time in the videoconference mode, but it is sometimes difficult to justify this with a real business need. Specialized software allows you to monitor employees more elegantly. Of course, not all employees will like it, but the availability of such mechanisms should always be openly negotiated. Some experts urge homeworkers to take this from a different perspective – monitoring tools allow the most motivated of them to prove themselves to the management. An employer using such tools can identify bottlenecks in the organization of business processes, find reserves for increasing labor productivity.
Picture Credit: Unsplash
This publication will discuss cases where antivirus software slows down the speed of browsing sites in the browser, as well as cases when the anti-virus reduces the speed of connecting to the Internet as a whole.
Many users are wondering if antivirus software can slow down the speed of the Internet. However, the answer to this question is not as clear as we would like.
In this article, we will describe to you the situations in which the antivirus program only slows down the process of viewing sites in the browser (without affecting the speed of the Internet connection itself), as well as situations in which the antivirus really reduces the overall speed of the Internet connection.
- To protect your computer from network and external threats, the antivirus uses various scanning methods. If a particular type of scan is not supported by a particular browser, it may take longer to load pages.
- If on the computer, in addition to the antivirus, other protection software is also installed, this can slow down the system. In such cases, when you try to connect to the Internet, the speed may be relatively low.
- Often the speed of connecting to the Internet depends on the hardware and functional features of browsers. In particular, users will definitely encounter problems related to Internet speed if they use antivirus with outdated computer models.
- If the version of the antivirus installed on the PC is out of date, it will take longer to open the pages. Therefore, make sure that the software and browser are updated in order to avoid problems with the Internet speed associated with the use of antivirus.
- Sometimes when you turn on certain firewalls, add-ons and browser extensions, a conflict with the antivirus program may occur. This is why it is best to avoid applications that can affect the Internet and slow down download speeds.
- If there is not enough free space on your PC’s hard drive, but you have installed antivirus, this can slow down the speed of Internet access.
- Picture Credit:
The effectiveness of antiviruses is often the subject of controversy: a discussion of the advantages and disadvantages of free software to protect PCs. To put an end to such discussions, the independent AV-Test laboratory decided to test 18 popular free antiviruses.
What is known about the best free antivirus
According to the specialists of the German company, the antivirus-winner — Microsoft Windows Defender — entered the top ten most effective antivirus programs and received maximum ratings in the categories of “usability” and “reliability of protection”, as well as 5.5 points out of 6 possible by the criterion of “performance “
Microsoft Windows Defender has demonstrated 100% protection against malicious attacks, including zero-day threats, as well as the absence of false locks and warnings.
Why Microsoft Antivirus is the Best
In particular, the application successfully recognized 20,428 virus samples recorded in the last 4 weeks before the test.
During testing, there were used the current version of the program with permission to access cloud services and the current version of signatures.
To test the effectiveness of the antivirus there were analyzed the operation of all its components using real threats. Experts also noted a low level of false positives — after analyzing 1,384,100 samples, the antivirus made a mistake in only two cases.
Where to download antivirus
Note that Windows Defender is already part of the Microsoft operating system and does not require a preliminary installation.
Picture Credit: Pexels
The past couple of years has been rife with software vulnerabilities that have led to some very serious consequences. Credit card and financial hacks from major businesses are being announced several times a year. Applications in the Google Play store have been found to be Trojan horse fronts to gain access to sensitive information stored on mobile phones. Bugs like Heartbleed have caused panic, and both Apple and Snapchat are under scrutiny for massive nude photo leaks.
With no clear way of telling how these vulnerabilities are being exploited, or by who, user trust is at an all time low. It is no wonder, as they have been shown quite clearly that any expectation of privacy they once had were completely overestimated. They have no privacy or security at all, at least that is how they are currently feeling.
The Problem With Current Software
This puts many of us in a difficult bind. A lot of software uses the same kind of coding, which is most responsible for the vulnerabilities. For example, improper neutralization of special elements used in an SQL command. While many software developers have put protections into place, like two-step verification, or Google’s team up with FIDO Alliance to introduce a physical drive for getting past authorization requests, there is still a risk.
How can you be sure the software you use is free of vulnerabilities? There is no 100% way, because even the smallest crack can be ripped wide and exploited if found. But you can lessen the chances of this happening to you by developing your own software.
Taking Things Into Your Own Hands
Your business needs software, and it needs to be as safe as possible. By being a part of the process and developing something custom, you are putting in every effort to make sure it is safe for your customers. This can save you a lot of grief and money in the long run, because the second a vulnerability leads to a hack or leak, you can be sure the consequences will be dire. Especially if you are a small to medium sized business.
Another benefit is that a custom piece of software will have exactly what your customers (and by extension your business) needs.
Don’t leave things up to fate. The only person you can rely on is yourself and your team, so you should all be a part of the development process to ensure you have the best and safest software possible for your business.
The anti-virus vendor Avast alerts that unpatched Home windows XP machines still pose a significant threat to the web ecosystem by harbouring 75 % of rootkit infections.
The organization comes with an unique understanding of the threat landscape because of over 130 million active Avast! anti-virus installations worldwide that send it adware and spyware telemetry. Based on a current analysis carried out through the firm’s scientists, 74 percent of 630,000 rootkit samples based in the wild came from from Home windows XP machines.
This rootkit infection minute rates are almost two occasions greater compared to decade-old operating system’s global usage share of 38 percent. Avast’s statistics reveal that 49 percent of their clients have XP running on the computer systems.
The amounts show the high Home windows XP infection count can’t just be described by its share of the market. “One problem with Home windows XP may be the large number of unlicensed versions, especially as customers are frequently not able to correctly update them since the software can not be validated through the Microsoft update,” stated Przemyslaw Gmerek, Avast’s leading rootkit expert.
Rootkits are serious risks simply because they function in the cheapest quantity of a operating-system, causing them to be tough to identify. For instance, some rootkits hook the file system motorists to cover malicious files.
Others even operate outdoors the OS, providing them with a lot more treatments for machine. They are known as bootkits simply because they infect a partition’s Master Boot Record (MBR) and, based on Avast, they have the effect of 62 percent of rootkit infections.
The very best MBR rootkit family is called Alureon, TDL or TDSS. The most recent variant, TDL4, is capable of doing self-propagation and may infect 64-bit versions of Home windows Vista and Home windows 7.
Read more …
Picture credit: Avast
Last week’s post about the stylish cycling shirt caused a big stir with lots of questions, comments and also emails from people asking for a sample
For starters, an old friend called me with a proposal that his company could produce those shirts for us in Italy! Well, we need to see about the price but I certainly thank you for the tip.
Someone else suggested that we should send these shirts as a gift to other AV companies – and he suggested AVG where several top managers are cycling enthusiasts. I think this is great idea – wouldn’t that be nice advertising!
read more …