Custom Search

Thursday, July 23, 2009

Malware: what it is and how to prevent it

Introduction

Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit, and generally screw things up. Malware programs are usually poorly-programmed and can cause your computer to become unbearably slow and unstable in addition to all the other havoc they wreak.

Many of them will reinstall themselves even after you think you have removed them, or hide themselves deep within Windows, making them very difficult to clean. This guide will detail the different varieties of malware along with basic preventive measures. In a follow-up article, we will examine the removal process and review a set of spyware removers. Although also considered to be malware, programs such as viruses, worms, trojans, and everything else generally detected by anti-virus software will not be discussed here, and the use of the word malware will only explicitly refer to software that fits in the categories listed below.

You can get infected by malware in several ways. Malware often comes bundled with other programs (Kazaa, iMesh, and other file sharing programs seem to be the biggest bundlers). These malware programs usually pop-up ads, sending revenue from the ads to the program's authors. Others are installed from websites, pretending to be software needed to view the website. Still others, most notably some of the CoolWebSearch variants, install themselves through holes in Internet Explorer like a virus would, requiring you to do nothing but visit the wrong web page to get infected.

The vast majority, however, must be installed by the user. Unfortunately, getting infected with malware is usually much easier than getting rid of it, and once you get malware on your computer it tends to multiply.

Will anti-virus programs protect against malware?

Anti-virus companies are only beginning to pay attention to malware. Aside from some of the latest versions (many include the malware scanner in the Internet security portion of their suites), most anti-virus programs have little to no protection. Those anti-virus programs that do protect are generally not as thorough as a dedicated malware remover. However, some especially virulent malware that malware scanners may miss will be removed by anti-virus programs, so it is generally a good idea to run a virus scan as well. Some of the anti-virus vendors' delay may be caused by worries they will get sued if they start labeling programs spyware, adware, etc., which has already happened.

Types of malware

Although there is no official breakdown, we can divide malware into several broad categories of malware: adware, spyware, hijackers, toolbars, and dialers. Many, if not most malware programs will fit into more than one category.

It is very common for people to use the words adware, spyware, and malware interchangeably. Most products that call themselves spyware or adware removers will actually remove all types of malware.

Adware

Adware is the class of programs that place advertisements on your screen. These may be in the form of pop-ups, pop-unders, advertisements embedded in programs, advertisements placed on top of ads in web sites, or any other way the authors can think of showing you an ad. The pop-ups generally will not be stopped by pop-up stoppers, and often are not dependent on your having Internet Explorer open. They may show up when you are playing a game, writing a document, listening to music, or anything else. Should you be surfing, the advertisements will often be related to the web page you are viewing.

Spyware

Programs classified as spyware send information about you and your computer to somebody else. Some spyware simply relays the addresses of sites you visit or terms you search for to a server somewhere. Others may send back information you type into forms in Internet Explorer or the names of files you download. Still others search your hard drive and report back what programs you have installed, contents of your e-mail client's address book (usually to be sold to spammers), or any other information about or on your computer – things such as your name, browser history, login names and passwords, credit card numbers, and your phone number and address.

Spyware often works in conjunction with toolbars. It may also use a program that is always running in the background to collect data, or it may integrate itself into Internet Explorer, allowing it to run undetected whenever Internet Explorer is open.

Hijackers

Hijackers take control of various parts of your web browser, including your home page, search pages, and search bar. They may also redirect you to certain sites should you mistype an address or prevent you from going to a website they would rather you not, such as sites that combat malware. Some will even redirect you to their own search engine when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

Toolbars

Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers. The Google and Yahoo! toolbars are probably the most common legitimate examples, and malware toolbars often attempt to emulate their functionality and look. Malware toolbars almost always include characteristics of the other malware categories, which is usually what gets it classified as malware. Any toolbar that is installed through underhanded means falls into the category of malware.

Dialers

Dialers are programs that set up your modem connection to connect to a 1-900 number. This provides the number's owner with revenue while leaving you with a large phone bill. There are some legitimate uses for dialers, such as for people who do not have access to credit cards. Most dialers, however, are installed quietly and attempt to do their dirty work without being detected.

Wednesday, July 8, 2009

Comodo Firewall 3.10.101801

Publisher's description

Unfortunately, most firewalls leak. But Comodo's Firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure its firewall powerful enough to ward off these attacks with default settings. No other firewall has had to work this hard.
  • PC Magazine Online's Editor's Choice
  • Secures against internal and external attacks
  • Blocks internet access to malicious Trojan programs
  • Safeguards your Personal data against theft
  • Delivers total end-point security for
  • Personal Computers and Networks

Screenshots

Technical

File Size:
75.33M
License:
Freeware
Released:
Jul 05, 2009
Downloads:
249 (All versions: 23137)
OS Support:
Windows XP/2003/Vista
Plugins:
None
Publisher:
Comodo
Homepage:
http://www.personalfirewall.comodo.com/

A-squared Anti-Malware 4.5.0.13

Publisher's description

(From Emsi Software ):

A-squared Anti-Malware uses two full scan engines in the battle against Viruses, Trojans/Backdoors, Spyware/Adware, Worms/Bots, Keyloggers, Dialers and all other types of Malware that are waiting on the internet. But there is no doubling of the scan duration as it would be the case with two separate scanning programs. Considerable performance improvement is possible thanks to the integration of the two engines on the lowest level. Signature updates are available at least 5 times per day, currently providing detection for about 3 million different types of Malware.

Download from Cnet

Malwarebytes Anti-Malware 1.38

Publisher's description

Click Here TO See Video
(From Malwarebytes ):

Malwarebytes' Anti-Malware is a high performance anti-malware application that thoroughly removes even the most advanced malware and spyware. With one of the fastest, most effective quick scans and malware removal capabilities on the market, this program is the perfect addition to your PC's defenses. The full version of the product includes a number of key features, including the ability to schedule updates and scans and most importantly, a real-time malware protection module that blocks malicious processes before they even start.

Version 1.38 adds new command line parameters: /logtofolder, /logtofile; adds some proxy support and fixes a few bugs.

Download from Cnet

SuperAntiSpyware 4.26.1006

Publisher's description

SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware that other products miss! SUPERAntiSpyware will remove ALL the Spyware, NOT just the easy ones!

  • Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, and More!
  • Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats.
  • Trust Items and Exclude Folders for complete customization of scanning.

Screenshots

Technical

File Size:
6.26M
License:
Freeware
Released:
Jun 25, 2009
Downloads:
1719 (All versions: 49998)
OS Support:
Windows (All Versions)
Plugins:
None
Publisher:
SUPERAntiSpyware
Homepage:

MD5 Checksum:
f91e3360645668ace85ed30807ddc436

AVG Anti-Spyware 7.5.1.43

Publisher's description

Anti-Virus programs offer insufficient protection against urgently growing threats like Trojans, Worms, Dialers, Hijackers, Spyware and Keyloggers. That's where the protection of ewido anti-spyware begins and supplements existing security applications to create a complete security system - because only a complete security system works effectively.
  • NEW Completely renewed user interface
  • NEW Possibility to create exceptions
  • NEW Shredder for secure file deletion
  • NEW XP Antispy
  • NEW BHO Viewer
  • NEW LSP Viewer
  • Heuristics to detect unknown threats
  • Scanning and cleaning of the Windows registry
  • Support for NTFS-ADS scanning
  • Daily database updates
  • Patch proof by using strong signatures
  • Analysis tools (startup, connections and processes)
  • Intelligent online-update
  • Scan inside archives
  • Secure detection and deletion of DLL-Trojans
  • Generic crypter detection through emulation
  • Generic binder detection
  • Free E-Mail Support
  • Automatic Clean Engine
  • Quarantine for suspicious files
  • Multilingual User Interface

Additional features of the Plus-Version

  • NEW Scheduled scans
  • Real-time monitoring of the entire system
  • Memory Scan detects active threats
  • Self-protection at kernel layer guarantees gapless monitoring
  • Automatic online-update

This setup contains the free as well as the paid version of ewido anti-spyware. After the installation, a free 30-day trial version containing all the extensions of the full version will be activated. At the end of the trial, these extensions will be deactivated and the program will turn into a feature-limited freeware version. The purchased license code can be entered at any time.

This product was formerly knows as Ewido Security Suite

Screenshots

Technical

File Size:
11.84M
License:
Shareware
Released:
Jun 15, 2007
Downloads:
40612 (All versions: 42582)
OS Support:
Windows 2000/XP/2003
Plugins:
None
Publisher:
Grisoft Inc
Homepage:
http://free.grisoft.com/doc/avg-anti-spyware-free
MD5 Checksum:
717f4fe2f0a759765d8629d9380d2e72

Ad-Aware 2009 8.0.5.0

Publisher's description

Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D is free, so there's no harm in trying to see if something snooped into your computer, too :)

Screenshots

Technical

File Size:
15.65M
License:
Freeware
Released:
Jan 28, 2009
Downloads:
26017 (All versions: 114660)
OS Support:
Windows (All Versions)
Plugins:
None
Publisher:
PepiMK Software
Homepage:

MD5 Checksum:
54acba9cfd7154c02ceacf6310cf3cfa

Grab this Widget ~ Blogger Accessories