Results 1 to 6 of 6

Thread: So how did I get infected in the first place?

  1. #1
    Security Expert TonyKlein's Avatar
    Join Date
    Oct 2005
    Location
    The Netherlands
    Posts
    138

    Default So how did I get infected in the first place?

    Watch what you download and where from. If you insist on using a P2P program, please read File Sharing, otherwise known as Peer To Peer. (P2P)

    It's important to always keep current with the latest security fixes from Microsoft. UPDATED WINDOWS

    Note:

    Usually one can have more than one anti-spyware, anti-malware type programs installed without issue, although one may decide to choose one resident real time protection.

    The same does not apply to firewalls and anti-virus programs.

    Rule of thumb is one firewall and one anti virus program resident to avoid conflicts, loss of program efficiency and system lock up due to both software products attempting to access the same files at the same time.

    An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible. Some very good and easy-to-use free A/V programs are Avast and AntiVir. It's a good idea to set these to receive automatic updates so you are always as fully protected as possible from the newest virus threats. Microsoft Security Essentials is also an option.

    If a personal computer is infected you may post Farbar Recovery Scan Tool (FRST) and aswMBR logs in the Malware Removal Forum to receive free assistance from our volunteer analysts.
    Please see the FAQ first: "BEFORE You POST"(Please read this Procedure Before Requesting Assistance)


    Happy safe computing!!
    Last edited by tashi; 2011-08-11 at 07:29. Reason: Updated

  2. #2
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    33,202

    Default Oracle (Sun)Microsystems-Java Security vulnerability in older versions left on system

    The Java SE Runtime Environment (JRE) allows end-users to run Java applications.

    It is very important not only to keep Sun Java up to date, but also to remove older versions which have security holes and can be exploited by malware.

    Java JRE updates/advisories thread:
    http://forums.spybot.info/showthread.php?45200-Java-JRE-updates-advisories/page4

    How do I uninstall Java on my Windows computer ?
    http://www.java.com/en/download/uninstall.jsp

    Why should I remove older versions of Java from my system?
    http://www.java.com/en/download/faq/...erversions.xml
    Last edited by tashi; 2012-09-01 at 06:31. Reason: Update
    Microsoft MVP - Consumer Security

  3. #3
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    33,202

    Default 14 ways to get Infected without trying

    14 ways to get Infected without trying

    A little bit of humour but also based on fact.

    1) Look for cracks, subdivided in illegal software and .....

    2) Practice unsafe hex, browse the web for free pOrn

    3) Look for software that adds smileys to your posts, mail etc

    4) Look for kewl skins, screensavers etc

    5) Look for spyware removers, concentrate on the kind that makes you pay before it removes anything

    6) Install a P2P program and repeat all of the above

    7) You always want the best; use p2p to download anti-virus/firewall software.

    8) Do NOT pay for anything, the internet is a place where you can steal anything from everyone without even saying as much as thank you

    9) Don't have/use/update antivirus/security software

    10) Look for pokergames, slotmachines and other gambling outfits

    11) Look for ringtones and other stuff to bling your phone

    12) Click on those unexpected links and attachments in email, because you're curious...

    13) Do loan your laptop to the next door neighbour for the weekend and give him your Admin account login so he can get his project done with no hassles

    14) Let the Babysitter use your laptop for 'schoolwork'


    Thanks to Metallica for most of those and CalamityJane, bitman, Lonny, shelf life.
    Microsoft MVP - Consumer Security

  4. #4
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    33,202

    Default Botnets and Infected Computers

    A botnet is a collection of compromised computers under the remote command and control of a criminal “botherder.” Most owners of the compromised computers are unknowing and unwitting victims. They have unintentionally allowed unauthorized access and use of their computers as a vehicle to facilitate other crimes, such as identity theft, denial of service attacks, phishing, click fraud, and the mass distribution of spam and spyware. Because of their widely distributed capabilities, botnets are a growing threat to national security, the national information infrastructure, and the economy.

    “The majority of victims are not even aware that their computer has been compromised or their personal information exploited,” said FBI Assistant Director for the Cyber Division James Finch. “An attacker gains control by infecting the computer with a virus or other malicious code and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised.”
    http://www.fbi.gov/pressrel/pressrel07/botnet061307.htm

    Practice safe hex, protect your computer, other netizens and yourself.
    Microsoft MVP - Consumer Security

  5. #5
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    33,202

    Default Useful Tools

    Secunia Personal Software Inspector (PSI) Free for personal use. FAQ

    PSI -Install software inspector, download: http://secunia.com/vulnerability_scanning/personal/

    ---------------------------------------------------------

    WOT's safe browsing tool for Internet Explorer or Firefox


    http://www.mywot.com/

    The WOT (Web Of Trust) community has rated countless websites and while not infallible it is a useful barometer to assist in avoiding sites that host malware, on-line scams and spam.

    Process Explorer
    http://technet.microsoft.com/en-us/s.../bb896653.aspx

    Process Monitor
    http://technet.microsoft.com/en-us/s.../bb896645.aspx
    Microsoft MVP - Consumer Security

  6. #6
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    33,202

    Default Optional Installs

    When installing new software or updates be watchful for the inclusion of toolbars or other software, including browsers and add-ons which may change your default homepage or search engine.

    Avoid clicking through in a hurry without looking for pre-checked boxes and reading the small print or you may end up with an unwanted program. One that could be time consuming to remove.

    Choose a custom install if offered so one can opt-out of any unwanted third party software or additions. Some users may find the offers useful but make sure you know what you are agreeing to.
    Last edited by tashi; 2009-07-18 at 02:57. Reason: Update
    Microsoft MVP - Consumer Security

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •