Keeping Cybercrime at Bay
Internet is lured with different tips and tricks on how we can battle cyber crimes but unfortunately, an avalanche of attacks are prevalent and many available services including mobile phones, games,online banking etc. contributes to the success of cybercrime, all areas that are especially vulnerable to attack rely on the easy downloading, social networking, blogs, publishing, and other information-sharing methods that make every users vulnerable to malware infections. Constant reminder and safety gear on cyber crimes are given once in while to all our client’s and updating everyone on the new threads and techniques cyber criminals are using for us to continue using the internet for fun, learning, business and communication. Philippine Web Hosting Provider want to educate you once more on how cyber criminals works and to achieve a community that can and will succeed in winning against cybercrime a goal worth striving for…..
Most often than not cybercriminals opt to conduct discrete attacks that target specific organizations to gain money, an easy business for con artist targeting enterprise, government and individual. They can steal or rob you in the cyber world choosing it’s own tools in every changing generations from Trojan in the form of botnet, malware, phishing and other bad elements using number of techniques to achieve this goal.
1. Delivery- The first step in any cybercrime is delivering and installing the malware. Con Artist use a flavorful techniques to achieved their goal. Today’s top malware infection techniques ( infection vectors) are spam mailings and con websites. The ideal setup for criminals is a vulnerable victim machine that allows malware to be installed easily, whether it is delivered by spam or by a “drive-by” scenario, where badware is downloaded from infected website while surfing the net.
2. Deployment- Once the malware is launch, the criminals strive for it to remain undetected for as long as possible. Malware genius use a number of technical strategies to maximize the lifespan of each piece of malware. They use rootkit methods to stay undetected other techniques are suppression of system error messages, concealed increases in file size, many and varied packers, and suppression of antivirus warning messages. Malware authors used a form of morph code on victims machine re-compiling code on web servers with “do-nothing instructions” that vary over time, making it significantly more difficult to detect the new malware residing on the server. In fact, today, there are websites where bots re-compile malware as often as every five minutes.
Attacking Security Solutions
Another common technique used in malware is the sabotage of security programs, to prevent detection and extend shelf-life. Malware sabotage often occurs through the termination of security processes, deletion of code, or modification of the Windows hosts file to prevent antivirus program updates. In addition, malware often removes malicious code that is already installed, not for the user’s benefit, but to ensure “ownership” and control of the victim machine exclusively for its own benefit. This active competition between malicious programs highlights the rich opportunities that are available to malware writers and the criminals that sponsor them.
We cannot deny the fact that users are also a factor of cybercrimes. Ultimately, any security system is only as effective as the weakest link. In the case of online security, the weakest link is always the human factor. As a result, social engineering techniques are a key element in malware dissemination processes used today. Techniques are often as simple as sending links purportedly from a friend via email or instant messaging (IM). These links are crafted to look as if they lead to interesting online resources, but in reality, these links lead to infected web resources. Today, email messages can contain scripts that connect to infected websites without any user interaction at all. Even the educated, highly cautious person who never clicks on unsolicited links is in danger of infection by a “drive-by” download. The inclusion of current events in such campaigns occurs today with alarming speed, yielding astonishingly effective results. Phishing continues to be a major source of infection despite efforts by banks and other organizations that conduct online financial transactions to implement countermeasures. Too many innocent victims can still be convinced to explore interesting links and to accept official-looking communications as legitimate.
Excerpted from: securelist.com
For every individual, enterprise and netizens in general we need to achieve and use a number of protection strategies. Naturally, anti-malware software and risk management techniques are of great importance at all levels. Educate yourself about the growing types of cybercrimes, learn from them help build a community of cybercrime fighters, report incidents. There should be legal measures requiring people to behave in a secure and legal fashion online, as well as legal consequences to support enforcement efforts. Get involve, though we cannot diminished cybercrimes in the World Wide Web together we can make internet a safer place.
Photo Credit@ techadvisory.org
If you want Friendly and certified Web hosting in the Philippines visit www.mswebnetwork.net. Sign Up Now! Like us on email@example.com/PhilippineHOSTING. Register your domain with us!