The rising trend of Trojans spread through mobile storage devices

Source: Internet
Author: User
Tags access virus scan

Reporter from the national Computer Virus Emergency treatment center learned that the recent passing of U disk and other mobile storage equipment to carry out the Trojan horse (such as Trojan "Downloader" and Variants, "U disk Killer", etc.) is on the rise, many computer users have been different degrees of damage.

National Computer virus Emergency treatment center after analysis found that the Trojan in these programs through the Internet to download and infect computer systems accounted for a large proportion. The frequency of using the Internet is likely to increase in a short period of time because of the student summer holiday, especially when downloading some programs via the Internet. This will provide more opportunities for the spread of Trojan horse programs.

At present, Trojan manufacturers will be malicious Trojan program on the internet to spread the common way there are: some Trojan disguised as point-to-point download the use of the seed file, or malicious Trojan program disguised bundled to some popular software, movies, MP3 music and other data resources, If computer users search for and download these problematic data resources through these popular keywords, they are likely to be infected by these malicious Trojan attacks.

In response to this class of mobile storage devices for the transmission of Trojan horse program, the National Computer Virus Emergency treatment center recommended that the vast number of users to take precautionary measures:

1, to develop the use of U disk, MP3, mobile hard disk, such as mobile storage equipment good habits. For example: When the foreign U disk access computer system, must first after the anti-virus treatment, or the use of a U disk virus immune function of the anti-virus software after killing, and then access to computer systems; In addition, turn off Microsoft's "AutoPlay" feature.

2, download the installation system missing patches to prevent further infection and spread of the virus.

3, in time to update the system anti-virus software, to do a regular upgrade, timed killing virus.

4, to the regular portal to download applications and software, to avoid software installation package is bundled into the Trojan virus. After downloading should first virus scan, confirm non-toxic and then install run.

5, as a result of the virus through the web site hanging horse transmission, we recommend that users do not click the unknown link, do not log on to unknown sites.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.