11 noteworthy security issues and countermeasures

Source: Internet
Author: User
Tags mail safe mode virtual environment

In fact, the overall accuracy of anti-malware scans is surprisingly poor, especially for 0day vulnerabilities. After all, cracker (refers to malicious cracked or destroyed a program, system and network security, hacker and cracker have the essential difference, I think not translation more accurate expression) can arbitrarily change their tactics, and sometimes change a few bytes, you can avoid antivirus software scanning.

In order to solve this problem, many anti-virus software monitoring program behavior, inspired to discover previously not found malware, while using virtual environment, system monitoring, network traffic monitoring technology to improve accuracy, but usually the effect is not ideal.

Here are 11 signs that your computer is already under attack and what you can do about it. Of course, no matter what the case, the best way to do this is to restore the system one key to the best state. If you don't want to take such drastic measures, here are some compromises.

  1. Fake Antivirus message

If you receive a fake anti-virus warning message, the malware has "occupied" your system with patches of software (usually JRE or an Adobe product). These camouflage scans will find piles of "viruses", click on the antivirus links they provide, and you'll get into a seemingly professional website filled with product referrals, tempting you to buy their products, get your card number and personal information. This is a lot of cracker must kill technology, but this recruit in our country antivirus software free of national conditions seems not very applicable.

Coping Strategy 1: Once you find a fake anti-virus warning, shut it down! In Safe mode, start the computer and uninstall the newly installed malware. or restore the computer to the state before it was attacked. Then test the computer in normal mode to make sure that the fake anti-virus information is gone, and finally perform a comprehensive scan, which normally scans for some residual viruses.

  2. Inexplicable browser plugin

This is another common way to attack, unless you confirm the normal source of the toolbar, it is best to remove it.

Coping Strategy 2: Most browsers will let you confirm the installation of the toolbar. Delete the plugin you have not installed or unsure, if you can not successfully delete, to see if the browser can be restored to the original state. If this does not work, please refer to the anti-Black 1 approach. In general, keep the software updated, and when installing the software, note whether there are plug-ins that can effectively avoid malicious toolbars. Tip: In a license agreement that most people will ignore, it is common to point out which Plug-ins will be installed.

  3. REDIRECT Search

Many cracker means to make a living by redirecting your browser to their customers ' websites, and they will ask their customers for payment through your clicks. This malware is often encountered when searching for some associated or common words, such as puppy or goldfish. Unfortunately, many redirect searches today hide themselves by leveraging additional proxies. Typically, if you have a forged browser plugin, you will also be redirected. Users with a certain technical capability can monitor the browser or network traffic to see if they are under this attack.

Coping Strategy 3: Refer to the previous coping strategy. Usually uninstalling a malicious toolbar program is enough to get rid of malicious redirects.

  4. Frequent random bouncing windows

This is a more common and difficult way to attack. When you are in a Web site that usually doesn't play a window, your system is already hacked when you frequently encounter a window. The author has been very curious about how these sites bypass your bulletproof mechanism, like spam, but the nature is worse.

Coping Strategies 4: Usually random window is caused by one of the three malicious attacks mentioned above, so the countermeasures refer to the above three.

  5. Your friend received a malicious email from your account

Ten years ago, e-mail attachment virus was rage, which scanned your address book and sent a malicious message. Now, malicious programs and cracker can also get contact lists through social networking sites, and if that's the case, your computer is still safe.

Coping Strategy 5: If your friend complains to you that you've received a malicious email, it's time to scan your computer for a complete sweep of software and plug-ins you don't know. This kind of attack usually does not need to worry excessively, but does some health examination to have no harm.

  6. Password changed

Cracker will be disguised as a service side, to send users to change the password of the message, the address link to a phishing site, users who enter the site to change the password operation, the cracker will get your account information.

Coping Strategy 6: Most online services are experienced in handling this malicious attack, and you can get a new password within minutes and regain control of the account. If other websites also use the same information as the stolen account, modify the passwords immediately. Websites usually do not send emails asking you to provide login information, if you receive similar emails can be directly logged on to the official website to confirm. In addition, dual authentication can be taken to ensure that your account is secure.

  7. Accidental Software Installation

Most early malware is a computer virus that works by modifying other legitimate programs. Currently, most malware programs are Trojans and worms, which are often disguised as legitimate programs and sometimes installed when other software is installed. So it's important to read the license agreement.

Coping Strategy 7: Many software will inform you of all installed programs during the installation process and you can choose not to install them. In addition, usually malicious programs can be found in the boot entry.

 8. The Mouse Diffuse screen flying

If the mouse is randomly "moving", usually because of a hardware problem, but if the mouse is not controlled to hit some programs, it is likely that your computer is remotely controlled. This is less common because cracker usually does some illegal work after hacking the computer, waiting for it to be idle for a long time (such as midnight).

Coping Strategy 8: If this happens, it's best to look at the intruder's purpose first, then turn off the computer, unplug the network cable, and ask the professional for help. It is also best to use other secure computers, change all accounts and passwords immediately and format the computer, check your bank account transactions, and so on. If property damage has been caused, keep some evidence on the formatted computer and seek help from the law enforcement agencies.

  9. Your antivirus software, Task Manager, or Registry Editor is disabled

Anti-Virus software is disabled, or task Manager and Registry Editor can not start, are a more difficult way of malicious software attack.

Coping Strategy 9: It is highly recommended to reload the system, but if you want to adopt a more moderate strategy, you can search the Internet to find how to recover these features, which usually takes time because the attack is often very diverse.

  10. Loss of money in bank accounts

Usually cracker don't steal a little money at a time, they like to steal it all at once, often through foreign exchange or bank transfers. They will attack your computer first or lure you to the phishing website to get your account information.

Coping strategies 10: In most cases, financial institutions can recover stolen money. However, in some cases the court will decide that it is the client's responsibility to protect itself from cracker attacks. Therefore, the ability to recover money depends on the attitude of financial institutions. Opening a transaction reminder can also avoid these losses to a certain extent, and many financial institutions are allowed to set a trading limit, which will be alerted if the limit is exceeded or an account transferred abroad is received. Unfortunately, many cracker will reset their contacts and close their trading reminders before stealing money, so make sure that they are also alerted by financial institutions when they are changed.

  11. Receipt of information on the payment of goods

In this case, cracker has stolen your account, purchased the product, and even maxed out your credit card.

Coping Strategy 11: First find the reason for the account stolen, if it is one of the reasons above, you can take the corresponding strategy above. Then change all the accounts and passwords and turn to the law enforcement agencies. In the past, this may cause bad credit records, recently, credit reporting agencies have a certain experience in the treatment of cybercrime, should be able to minimize losses.

To sum up, most cracker attacks are mainly through the following three channels: not patched software, running Trojan program, phishing Mail. We can try to avoid from these three sources of attack, should be at any time to refer to the above point of view to check their computer, rely on a anti-virus software to perfect against all malicious software and cracker attack the idea is relatively naïve. If you're a risk-averse person, the best way to do this is to do a regular system restore.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.