Ad

Top Ten Tips for Protecting Corporate End Users

Based on results from the 2008 Corporate End User Study, Trend Micro advises both end users and businesses to observe the following precautions to avoid Web threats and address the increasing problem of data leaks to ensure a safer computing experience.

Following are some basic safety measures you and your children can implement together today particularly if your children are just beginning to explore the Internet:

1. To prevent data leaks and to combat increasing levels of Web threats, install a multi-layered strategy approach that locates security in the cloud before data reaches the gateway. Also protect data at the Internet gateway where the Internet connects to a corporate or Internet Service Provider network. Additionally, locate protections at the endpoint so data is analyzed on the user's PC or at the server.
2. Deploy vulnerability scanning software on the network and ensure all operating systems and other software applications are up-to-date and patched with the most recent security patches. Enable the "Automatic Update" feature in all users' operating systems, Web browsers, and applications.
3. Issue security policies and Internet usage guidelines on PC and laptop usage and mobile devices to control the information accessed.
4. Advise employees not to disclose sensitive information when receiving an email or telephone call. Banks and other institutions never call and request account information or Social Security numbers over the telephone or by email.
5. Develop corporate guidelines that advise against opening attachments or clicking on links contained in email messages from unknown senders. Also, train users to avoid installing files from unknown companies or organizations.
6. Educate end users about emerging threats and their consequences, emphasizing business-specific outcome such as a damaged reputation, lost customers, or regulatory fines.
7. Advise employees where they may or may not surf online. Many employees are unaware that Trojans and other malware can appear as blog comments and other code embedded on Web pages.
8. Prevent unnecessary protocols from entering the corporate network, such as P2P communication protocols and IRC.
9. Restrict user privileges for all network users. For example, kernel-level rootkits are implemented as device drivers; therefore, denying users the right to "load and unload device drivers" will largely block them.
10. To help protect mobile users on laptops, consistently update all systems and choose security products with in-the-cloud updates.

How to Protect against IM Threats

The messaging environment continues to evolve at an incredibly alarming rate. When Samuel Morse typed the message, "What hath God wrought!" on 24 May 1844, the world of message delivery changed forever. But never has it changed more than in the past 5-to-10 years with the explosion of email and Instant Messaging (IM). Once limited to desktops, IM is now available via handheld devices and cell phones, allowing users to chat from virtually anywhere, even becoming a staple mode of communication in business environments. With recent developments making IM protocols interoperable, users from one network are now about to communicate with users on another network.

However, IM is accompanied by its own share of security risks. Because IM is generally unprotected and unmonitored, it's vulnerable to attacks and can easily expose all users in an IM contact list to the same attacks via IM sent from that machine, creating the potential for rapid proliferation. In such a scenario, it's likely that any malicious code that propagates through one of the protocols will also propagate through the other, potentially impacting more users with minimal effort.

The most prevalent threats to IM include:
* Worms and Trojan Horses

Similar to threats sent by email, worms and Trojan horses via IM can compromise the integrity of IT systems. Too many IT departments focus on solely on email threats because they are not aware of the number of people using IM in their businesses. This is because individual users can load IM programs directly onto local computers, and IM traffic is often undetectable at the network level. According to the IMlogic Threat Center, "90% of IM-related security attacks included worm propagation; 9% delivered viruses; 1% exploited known client vulnerabilities or exploits." Via an IM program, it's possible for a Trojan horse to configure the client to give access to all files on a computer via peer-to-peer file sharing. Ultimately this opens up the entire computer system to attackers.

* Password Stealing and Impersonation

Hackers can use Trojan horses to gain access to an IM password if it's stored on the computer. Using this method, hackers can have access to the user's screen name and the user's entire list of IM contacts. Impersonation is not only harmful to the victim whose password has been stolen, but to anyone who interacts with the hacker and divulges personal information, or executes any files sent by the hacker under the guise of the user.

* Theft of Log Files

Similar to other forms of information theft, IM log files, which may be stored on a user's computer, are vulnerable to hackers. In many cases, these files may contain sensitive or private data from a past IM conversation the user has long since forgotten about. This information is readily available via IM logs, however, and can be devastating to businesses if exposed, causing tainted reputations, legal problems, and in some cases, loss of the business.

*Denial-of-Service (DoS) Attacks

A DOS attack via IM happens when a hacker sends a flood of messages for the purpose of overloading the resources of a computer or network. By the time the victim tries to add the hacker's screen name to the list of parties that the IM program should ignore, the computer may freeze or crash. Though DoS attacks tend to be more of a hassle and less of a threat than other types of hacks, they can be harmful when hackers combine DoS attacks with other security breaches such as shutting out users from their accounts to hijack systems.

* Privacy Intrusion

Outside parties can capture information to use in malicious ways, and employees may not be aware of the ramifications of their IM conversations. Businesses could be legally or financially at risk if employees send confidential information that's subsequently gathered by outside parties. Many IM programs don't offer encryption, making it easy for a third-party to eavesdrop on IM conversations using different types of programs such as packet sniffers. Businesses can deal with these risks by enforcing an IM policy that restricts the type of information that can be exchanged via IM and setting up a system to encrypt IM conversations.

TO BE CONTINUED ON PAGE 2

How to Protect against IM Threats 2

* SPIM

Similar to spam, spim is unsolicited messages sent via IM. Spim can be used to lure unsuspecting users to websites designed to collect private information. Web bots deployed by advertisers and spammers often collect screen names from public directories where individuals can list their IM screen names. To reduce spim, businesses should advise employees against listing screen names on any public directories or websites, and also to configure their IM clients to accept messages only from an approved list of contacts.

While many of these threats have the potential to wreak havoc on any business, there are a few steps businesses can take to mitigate IM threats so they can fully enjoy the benefits of IM:

* Install IM Security Tools

IM security tools span a variety of functions from capturing data sent over IM, to monitoring and tracking unusual IM behavior which may indicate misuse or virus-related security breaches. By installing IM security tools, businesses will have a more comprehensive, centralized solution to help manage IM usage within the company.

* Educate Employees and Create Corporate Policies

Employee education on any exchange service is paramount in securing the IT infrastructure, but especially on IM usage because of the potential for rapid proliferation throughout the network. Businesses should make it a priority to learn about the best safety and security practices and incorporate them into company policies. To protect businesses and employees, businesses should define appropriate uses of IM in the workplace and encourage precautionary measures such as not storing IM passwords on the computer.

*Secure IM Logs

Because IM programs automatically create and store logs of all conversations on a user's computer, hackers can obtain valuable information on a business, including specific statements made during a conversation as well as business secrets discussed via IM. One way to secure IM logs is to store them behind a corporate firewall or even delete the logs. These options are available in the preferences section of the program.

* Use Vulnerability Management Tools for Compliance

Businesses can install and use vulnerability management tools to gain an overview of IM software installed on employee machines. Using these tools, they can monitor whether employees have made any changes to their IM programs that violate business policies, and make sure that desktop firewall and antivirus programs are being used properly.

* Install Desktop Antivirus and Firewall Programs
Since spam sent over IM typically requires users to download and open an attachment. Security at the desktop and firewall level can guard against threats by blocking an attachment or cleaning an infected file. Installing desktop firewalls help protect individual machines from attacks from within an organization or through a LAN. Desktop firewalls are also good for those in a remote office or who handle sensitive data. Businesses should also install desktop antivirus programs to provide a final line of defense against viruses, worms, and Trojan horses.

* Install and Update IM Patches

The major public IM networks frequently deploy IM patches in response to newly discovered vulnerabilities in their programs. Businesses can reduce the risk of attacks to their computers via IM by installing and updating IM patches regularly.

There are many advantages to using IM in a business setting. If businesses choose to use this communication tool, they need to understand the security threats to IM and how to protect their business. By educating employees, enforcing policies, installing protective technologies, and, where possible, encrypting IM conversations, organizations can continue to enjoy the benefits of using IM as a business tool while also managing its risks.

Get Rs.500 Just for FREE signup. Get paid for Online Surveys.

Hi Friends,

I have found an interesting website for earning money in Internet. You can Earn Rs.2000 Jobs is simple doing surveys in the internet. It take only 2-5 min to complete the work. On an average you can Earn. Rs.1000 per day. Click this
http://www.surveyspaysu.com?id=193579 . and register today.

Earlier I was also thinking this thing as fake, but no tried and tasted and wonders...It actually works, because it's totally run and organise by India and this is for Indian Surveys ONLY.

Go get started and earn now, there's only risk of your 2 minutes signing up timing else you are losing anything, but if you don't join you might lose lost of extra money.


Get Rs.500 Just for FREE signup. Get paid for Online Surveys.

Convert Your Spare Time into Money. Just Register Free By clicking this Link http://www.surveyspaysu.com?id=193579 . Make Money By Filling simple online surveys. Its All FREE.

Worldwide Online Survey Jobs. Signup now and get Rs.500 Free.

Wanted Online Internet job workers. Spend 30 Minutes a Day. Complete online survey form daily and earn Rs.20000 to 30000 per month. Click http://www.surveyspaysu.com?id=193579 .and Register FREE


Dear friend, Online Survey Jobs for Indians. Get Rs.500 just for FREE signup

I have Earned Rs.500 within 10 min and still i can earn more by just doing simple online survey jobs. I spend only 30 min a day. You can also do this job. just click http://www.surveyspaysu.com?id=193579 . and Register FREE


Paid Survey Jobs available all over world. No investment required.

Get paid for your opinion. It is easy, just spend 30mts daily. Earn Rs.20000 to Rs.30000 per month. Get surveys into your email daily and earn daily. Please visit http://www.surveyspaysu.com?id=193579

Regards,
Kandarp Devashrayee

What Is Virus, Malware, Trojan or Worm?

Virus Primer

What is Malware?
A malware is a program that performs unexpected or unauthorized, but always malicious, actions. It is a general term used to refer to viruses, Trojans,
and worms. Malware, depending on their type, may or may not include replicating and non-replicating malicious code. Due to the many facets of malicious
code or a malicious program, referring to it as malware helps to avoid confusion. For example, a virus that also has Trojan-like capabilities may be called
malware.


What is a virus?
A computer virus is a program – a piece of executable code – that has the unique ability to replicate. Like biological viruses, computer viruses can spread
quickly and are often difficult to eradicate. They can attach themselves to just about any type of executable file and are spread as files that are copied
and sent from individual to individual.In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus
payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. If the virus does
not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.


What is a Trojan?
A Trojan is a malware that performs a malicious action, but has no replication abilities. Coined from Greek mythology's Trojan horse, a Trojan may arrive as
a seemingly harmless file or application, but actually has some hidden malicious intent within its code.Trojan malware usually have a payload. When a Trojan
is executed, you may experience unwanted system problems in operation, and sometimes loss of valuable data.


What is a worm?
A computer worm is a self-contained program (or set of programs) that is able to spread functional copies of itself or its segments to other computer systems.
The propagation usually takes place via network connections or email attachments. More recent worms have also discovered ways to propagate using Instant
Messengers, via file sharing applications, and by collaborating with other malware such as Trojans or other worm variants. WORM_BAGLE.BE, for example, forms
a vicious worm-Trojan cycle with TROJ_BAGLE.BE, in which the worm mass-mails copies of the Trojan, and the Trojan downloads copies of the worm. Additionally,
the FATSO family is a family of worms that propagate via an
instant messaging application and a popular peer-to-peer file sharing application. Some worms may have an additional payload, such as preventing a user from
accessing antivirus Web sites, or stealing the licenses of installed games and applications.


Life Cycle of a Malware
The life cycle of a malware begins when it is created and ends when it is completely eradicated. The following outline describes each stage:

Creation
Until recently, creating a malware required knowledge of a computer programming language. Today anyone with basic programming knowledge, and Internet access,
can create a malware. Whole Web sites exist whose only intent is to spread malicious code, and to encourage individuals to develop their own harmful version
of already existing, and tried-and-tested malicious programs.

Replication and Propagation
Malware propagate in a number of ways. Worms may spread via email, instant messengers, or network shares. Viruses replicate within a system, while some
viruses also have automatic propagation techniques similar to worms. Trojans. while not having any automatic form of replication and propagation, are
nevertheless available all over the Internet, and the links to download them from may be included in email messages, or other Web sites.For more information
on the propagation techniques of today's malware types, read more here.


Activation
Most malware perform their malicious activities upon execution. Some have certain payloads that are activated only at a certain trigger date, or with the
onset of a specific trigger condition.

Discovery
This phase does not always follow activation, but typically does. When a malware is detected and isolated, it is sent to the ICSA in Washington, D.C., to
be documented and distributed to antivirus software developers. However, with the rapid development of technology, and the ease by which malware authors
create their programs, most malware are released to unsuspecting users even before they are discovered by the "authorities". This is all the more reason
to protect your system from the threats that surround the computing world today.To read more about what you can do to prevent your system from becoming
infected, read more here.


Assimilation
At this point, antivirus software developers modify their software so that it can detect the new malware. This can take anywhere from one day to six months,
depending on the developer and the malware type.

Eradication
If enough users install up-to-date virus protection software, any malware can be wiped out. So far no malware have disappeared completely, but some have
long ceased to be a major threat.

What can you do to Protect against Malware?
There are many things you can do to protect against malware. At the top of the list is using a powerful antivirus product, and keeping it up-to-date with
the latest pattern files. You may also visit the ICSA lab's Web site for further suggestions.

Why do people create virus ?

I wonder why people waste their brain creating these crazy viruses which just copies itself into several locations making us harder to remove.

There may be several reasons Some would say that viruses would only give decent/advanced and better programmers ideas as to new holes in an OS. Thus snowballing themselves with new viruses to deal with. I think I can write the odd piece of malicious code, but i would never use it on anyone but myself. I do it to prove I’m a reasonable programmer and that i understand what an OS is doing in certain instances. It is a quesiton of morality when a programmer or hacker releases code for the use of destruction and corruption, sadly there are more destructive programmers than non-destructive in the virus industry.... even i believe that the antivirus industry creates virus itself to increase their sales..

You may say that i am being pessimist or psychic but that is not the case...

It is true the virus company creates the virus itself probably to increase the detection rate by it's product as the antivirus is judged by the detection ratio.

I believe most people write virus because they feel that they can.....
yes that's the case no ordinary people can create or write a virus it need a master piece brain.
Then why do they just use their brain in the wrong way.

Is mobility, threat to data security?

Mobile devices increase the productivity of workers around the world, giving them access to corporate information and keeping them connected even while they’re away from the physical office. The productivity increases are real: you just turn on the mobile device and get to work.

On the other side of the coin are the IT professionals who are challenged with the difficult task of keeping the virtual office secure and stable. From their perspective, every mobile device is a potential network security leak to be plugged and a potential data theft liability, especially since users are known to keep highly sensitive information like e-mails, SMS, contacts GPS tracks etc. on their devices.

A survey by InsightExpress found that the majority of smart phone users (55.7 percent) store confidential personal, business or client data on their devices (Source: Enterprise Networks and Servers) - thereby increasing the risk of this information falling into the wrong hands when the device is stolen.

Building a more secure deployment of mobile devices is crucial, but must also be balanced with providing a seamless and intuitive user experience which is a challenge that enterprises and IT vendors have to together address.

Here, it is important to understand that both the software used in any mobile computing device as well as the backend infrastructure play critical roles in addressing the security concerns and protecting confidential information. It is imperative that IT vendors posses a long-term security vision and a well chalked out security technology roadmap.

Microsoft has made security a key focus area under its trustworthy computing initiative, with a vision to provide the most secure products. Windows Mobile 6 – its latest mobile operating software, has both in built security features at the device level as well as those that offer users additional control over data.

The former includes features such as PIN authentication, password protection and storage card encryption (which can encrypt all data on the handheld i.e change it into a format that cannot be read without the encryption key) to prevent unauthorized access. The latter includes features that enable users to immediately erase data from a remote location, if the device is misplaced/ or stolen.

Enterprises on their part have to ensure that they have the right infrastructure in place and that their employees are well aware of the security measures they should adopt to guarantee security of data.

Let us first look at the mobile communication architecture that plays a key role in enterprise mobility. There are primarily three layers to consider when planning or upgrading a mobile deployment: the device, the message server and the network.

Device level security

At the device level, key challenges include allowing only authorized access to the device and preventing unauthorized applications such as viruses or spyware from being installed or accessing critical parts of the device. Besides password protection PIN authentication, password protection and storage card encryption, management role definition, application access tiers, code signing settings, security settings, and security certificates combine to help achieve device-level protection.

Vulnerability at the messaging server

Direct synchronization between the messaging server and the mobile device increases data security. On the other hand the presence of an additional middleware server means that data travels through additional links (Middleware server or Network Operations Center (NOC)), sometimes located in different continents, before it can reach the mobile device, thus increasing risk.

Here again architecturally, Windows Mobile powered devices have the greatest advantage, because the absence of a middleware server reduces the element of risk. Windows Exchange server + Winmobile architecture ensures that the data stays within the company's firewall thus making it secure.

Protecting network layer

Server security practices are key, but protecting the network layer is also critical. By configuring the corporate network according to best practices and implementing strong security protocols, enterprises can help prevent damage to the network. By using standard Internet security protocols and firewalls, customized solutions can be designed to cater to individual requirements on diverse parameters such as performance, stability, and security.

In addition, built-in features like Information Rights management (IRM) support for office documents also allows administrators to specify access permission to documents, workbooks, and presentations.

It is equally important that the user understands what security features are inbuilt into the device and takes the right measures to protect confidential data.

According to a recent survey, 74.6 per cent of handheld or smartphone users either do not have or do not know about the security protection on their devices. The product manual is a mine of information in this regard, and the enterprise can help by crafting FAQs that incorporate details of customization of security and other features to make it easy for the user.

Addressing security concerns at these multiple layers can help address the top three major areas for data protection which are leaks of confidential data during mail exchange, loss of data with loss of device and unauthorized access of the device.

It is thus imperative for both the smartphone user and the enterprise to carefully study the risk exposures and invest in an OS and add on features that minimize data security threats. Reassured on this front, mobile workers will be able to concentrate on being more productive without worrying about any security related risks of modern technology.

-Sumeet Gugnani

©CyberMedia News




Hijack This!

HijackThis™ opens you a possibility to find and fix nasty entries on your computer easier.
Therefore it will scan special parts in the registry and on your harddisk and compare them with the default settings. If there is some abnormality detected on your computer HijackThis will save them into a logfile. In order to find out what entries are nasty and what are installed by the user, you need some background information.


HijackThis™ is a free utility which quickly scans your Windows computer to find settings that may have been changed by spyware, malware or other unwanted programs. HijackThis creates a report, or log file, with the results of the scan.

IMPORTANT: HijackThis does not determine what is good or bad. Do not make any changes to your computer settings unless you are an expert computer user.

Advanced users can use HijackThis to remove unwanted settings or files.

Not an expert? Just save the HijackThis report and let a friend with more troubleshooting experience take a look. A large community of users participates in online forums, where experts help interpret HijackThis scan results to clean up infected computers.

*Trend Micro provides HijackThis as a free utility, without technical support. For answers to some common questions about HijackThis please visit the Help/FAQ page.

To analyze your computer, start HijackThis and run a scan. HijackThis will display a list of areas on your computer that might have been changed by spyware. Do not change any settings if you are unsure of what to do. There are many popular support forums on the web that provide free technical assistance by using HijackThis log files to diagnose an infected computer.

System requirements:

Operating System:

  • Microsoft™ Windows™ Vista
  • Microsoft™ Windows™ XP
  • Microsoft™ Windows™ 2000
  • Microsoft™ Windows™ Me
  • Microsoft™ Windows™ 98

Software:

  • Microsoft Internet Explorer 6.0 or 7.0
  • Mozilla™ Firefox™ 1.5 or 2.0

To download HijackThis, click HERE .

What Is Firewall?

FIREWALL
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:
* Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
* Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
* Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
* Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

In practice, many firewalls use two or more of these techniques in concert.

A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.

Process Explorer v11.20, Another Utility

Introduction

Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.

The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.

Process Explorer works on Windows 9x/Me, Windows NT 4.0, Windows 2000, Windows XP, Server 2003, and 64-bit versions of Windows for x64 and IA64 processors, and Windows Vista.

Download Process Explorer (1.6 MB)

Utility to stop Virus' Activities and Process


Screenshot


AutoRuns for Windows v9.21

By Mark Russinovich and Bryce Cogswell

Published: May 13, 2008

Introduction

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Autoruns' Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc.

You'll probably be surprised at how many executables are launched automatically!

Autoruns works on all versions of Windows including 64-bit versions.

Usage

See the November 2004 issue of Windows IT Pro Magazine for Mark's article that covers advanced usage of Autoruns . If you have questions or problems, visit the Sysinternals Autoruns Forum.

Simply run Autoruns and it shows you the currently configured auto-start applications as well as the full list of Registry and file system locations available for auto-start configuration. Autostart locations displayed by Autoruns include logon entries, Explorer add-ons, Internet Explorer add-ons including Browser Helper Objects (BHOs), Appinit DLLs, image hijacks, boot execute images, Winlogon notification DLLs, Windows Services and Winsock Layered Service Providers. Switch tabs to view autostarts from different categories.

To view the properties of an executable configured to run automatically, select it and use the Properties menu item or toolbar button. If Process Explorer is running and there is an active process executing the selected executable then the Process Explorer menu item in the Entry menu will open the process properties dialog box for the process executing the selected image.

Navigate to the Registry or file system location displayed or the configuration of an auto-start item by selecting the item and using the Jump menu item or toolbar button.

To disable an auto-start entry uncheck its check box. To delete an auto-start configuration entry use the Delete menu item or toolbar button.

Select entries in the User menu to view auto-starting images for different user accounts.

More information on display options and additional information is available in the on-line help.

Autorunsc Usage

Autorunsc is the command-line version of Autoruns. Its usage syntax is:

Usage: autorunsc [-a] | [-c] [-b] [-d] [-e] [-g] [-h] [-i] [-l] [-m] [-n] [-p] [-r] [-s] [-v] [-w] [-x] [user]

-aShow all entries.
-bBoot execute.
-cPrint output as CSV.
-dAppinit DLLs.
-eExplorer addons.
-gSidebar gadgets (Vista and higher).
-hImage hijacks.
-iInternet Explorer addons.
-lLogon startups (this is the default).
-mHide signed Microsoft entries.
-nWinsock protocol and network providers.
-pPrinter monitor drivers.
-rLSA providers.
-sAutostart services and non-disabled drivers.
-tScheduled tasks.
-vVerify digital signatures.
-wWinlogon entries.
-x Print output as XML.
userSpecifies the name of the user account for which autorun items will be shown.


Cyber Crime:Underground Economy

Underground Economy

Cyber crime is big business. See charts displaying the current prices paid for stolen data or for infecting machines or for SPAM mails.

Pay-out for each unique adware installation

30 cents in the United States, 20 cents in Canada, 10 cents in the UK, 2 cents elsewhere

Malware package, basic version

$1,000 - $2,000

Malware package with add-on services

Varying prices starting at $20

Exploit kit rental - 1 hour

$0.99 to $1

Exploit kit rental - 2.5 hours

$1.60 to $2

Exploit kit rental - 5 hours

$4, may vary

Undetected copy of a information-stealing certain Trojan

$80, may vary

Distributed Denial of Service attack

$100 per day

10,000 compromised PCs

$1,000

Stolen bank account credentials

Shocking only AT Varying prices starting at $50

1 million freshly-harvested emails (unverified)

$8 up, depending on quality

It's hidden but a now a huge economy effecting billions of peoples around the world with just some clicks of the mouse. Based on official survey conducted by Trend Micro Inc.USA.

Papers for eCrime 08 invited

The Anti-Phishing Working Group (APWG) has announced today that the eCrime Researchers Summit (eCrime 2008), the world's premier conference for basic and applied research in electronic crime studies, is now accepting papers for its third annual conference to be held in Atlanta on October 15-16.

eCrime 2008 will feature papers from leading researchers and technologists on Internet security, phraud, phishing, spoofing, electronic identity theft, click-fraud and crimeware. eCrime 2008 is made possible by a collaboration of principals from Stephens Institute of Technology, University of Alabama at Birmingham, Baylor University, and the APWG.

The complete call for papers announcement can be viewed at: http://www.ecrimeresearch.org/2008/cfp.html

"We've got a team of towering authorities in information security, privacy, and electronic crime to chair and staff our conference committees," said Foy Shiver, APWG Deputy Secretary General and Director of eCrime Researchers Summit Development. "Authors' exposure to these experts' opinions and direction will be of invaluable assistance to their research."

The General Chair of eCrime 2008 is Gary Warner, from the University of Alabama at Birmingham (UAB). Mr. Warner is the Director of Research in Computer Forensics at UAB, where he teaches and works to develop tools, techniques, and training to help eCrime investigators.

Program Co-Chairs for this year's conference are Susanne Wetzel of Stevens Institute of Technology and Randy Vaughn of Baylor University.

Randal Vaughn is active in Internet security with special interests in detecting, tracking and countering botnet formation and other eCrime activities. Mr. Vaughn lectures on Internet security, cyber warfare, telecommunications and software development at Baylor University's Hankamer School of Business.

Susanne Wetzel is on the faculty at the Computer Science Department of Stevens Institute of Technology. Her research interests are in security, cryptography and algorithmic number theory. In particular, her research is focused on wireless security, secret sharing, privacy, phishing, authentication, and biometrics.

The eCrime 2008 Steering Committee is comprised of Jean Camp, Indiana University; Dorothy Denning, Naval Postgraduate School; Zulfikar Ramzan, Symantec; John S. Quarterman, InternetPerils, Inc.; and Markus Jakobsson, PARC.

Original papers on all aspects of electronic crime are solicited for submission to eCrime '08. Topics of relevance include but are not limited to:

- Phishing, pharming, click-fraud, crimeware, extortion and emerging electronic crime attacks.
- Technical, legal, political, social and psychological aspects of fraud and fraud prevention.
- Techniques to assess the risks and yields of attacks and the success rates of countermeasures.
- Delivery techniques, including spam, voice mail and rank manipulation; and countermeasures.
- Spoofing of different types, and applications to fraud.
- Techniques to avoid detection, tracking and takedown; and ways to block such techniques.
- Honeypot design, data mining, and forensic aspects of fraud prevention.
- Design and evaluation of user interfaces in the context of fraud and network security.
- Best practices related to digital forensics tools and techniques, investigative procedures, and evidence acquisition, handling and preservation.

eCrime 2008 General Chair Gary Warner, said, "It's clear that the criminals are working in an organized fashion to develop new technologies to expand their ability to steal our data, identities, and money. The APWG's e-Crimes Researchers Summit exists to develop and encourage the research that will be the best response to that challenge."

Paper submissions are due: June 5, 2008 (midnight, US East Coast time). eCrime 2008, like past conferences, will offer a cash award for the best overall paper and travel awards for those papers accepted for presentation at the event. Conference details for eCrime '08 can be found at http://www.ecrime2008.org/

Malicious Banner Advertising



by Jake Soriano (Technical Communications)

Here’s another case to illustrate the importance of installing security updates, installing them in a timely manner, and installing not just OS updates, but those for third-party software applications as well.

Taking advantage of system vulnerabilities — most often the result of missing, or uninstalled, patches — malware authors are continually taking advantage of websites that have significantly high traffic (and this everyone knows) to target unsuspecting users.

Social networking site MySpace is reportedly said to be laced with banner ads that install malicious programs and files. Trend Micro detects some of these files as employing encryption similar to known variants of RBot, SDBot, and SPYBot malware.

This would not be the first time that MySpace has been compromised.

In November last year, TrendLabs analysts found pages of the social networking site embedded with codes that redirect users to malicious sites.

Similar banner ads were found on the popular search portal Excite.com. Brian Krebs of the Washington Post wrote that there are ads on the Web site containing malicious code, which redirects users to a page that tries to install a malware informing users of a bogus system infection, and then urges them to purchase the software that can “clean” the supposed infections.

The German Web site Blick was reported to have these same malicious banner ads as well.

Social networking sites have been targets of malware authors for a while now because of the large number of people who use them. Users are always reminded to exercise caution in their social networking activities online. And again, everyone is reminded to install all the necessary patches once they are available.

UTM Hype Or True Security....

Everybody makes sacrifices during which they give up one thing to get something more important. With the advent of Unified Threat Management (UTM) devices, network administrators gave up disparate point solutions for integrated tools that tackle tasks such as firewall, intrusion detection, antivirus, and more often than not, VPN connectivity. On the surface, this approach simplifies security. However, upon digging deeper, it is found that many UTMs potentially can dilute defenses to the point of mediocrity, leaving networks vulnerable to attack. Some others tackle key security issues yet leave out vital features related to management, reporting, and updateability.

The problem with UTMs has become worse over time. When research firm IDC conceived of the UTM market in 2004, it established standard definitions for these catchall tools. Since then, the definitions have drifted. Some UTMs have firewall but no VPN. Others have VPN but no antivirus. With dozens of products on the market today, customers must seek tools that offer a winning combination of proven solutions, centralized management, easy updates, and advanced reporting.

Proven solutions

A good UTM device offers battle-tested technology. Many times vendors build a UTM device around one all-star feature, sacrificing the quality of others for an overwhelming breadth of defense. Sure, the highlighted feature might be good, but more often than not its supporting cast is second-rate. The result is watered-down security that is not secure at all. When thinking about UTMs, picture a team approach: All the security components must work together to deliver top-notch protection that is second to none.

How do you know a technology is proven? First, ask prospective vendors to name some of the clients using it today. If a majority of Fortune 100 companies is using it, consider it a safe solution. Next, make sure the UTM includes features beyond the ones needed to maintain basic security.

Finally, make sure the tool includes some form of centralized management console—this will make keeping tabs on all of the components easier as networks expand over time.

It has the ability to perform network firewall functions, intrusion detection and prevention, as well as gateway antivirus scanning. Other common features found in UTMs include the filtering and controlling of a wide variety of network communications, such as Web, instant messaging and email traffic. The combination of multiple capabilities allows deep inspection of packets and real-time attack protection from layer two to Layer 7 of the Open System Interconnection (OSI) model. Some devices also offer VPN capabilities

A more recent UTM feature is the ability to inspect all network traffic, including encoded, compressed, encrypted and wireless traffic.

Centralized management

Everyone loves to multitask. Why? Because managing disparate security functions is easier if it can be done all at once. In the UTM space, a centralized approach empowers network administrators to see across their networks with panoramic views. Also, the very best of these management consoles is compatible with a number of existing point solutions—a characteristic known as "extensibility." This enables network gurus to link new and preexisting solutions that are not covered under a new UTM box into a UTM manager.

Also, there are other benefits. A centralized strategy offers improved visibility and faster response times to problems when they arise. UTMs with centralized management also enable network administrators to manage a number of security features across a large number of sites. This is especially handy for mid-size corporations that may not be able to employ human eyes to manage security in remote outposts. By centralizing management, administering security over these distances becomes more of a possibility.

Enhanced updateability

A single point of management also makes it easier to administer fast and frequent security updates across the network. In the past, UTM devices combined security features with no method for ensuring that signatures were up to date. As a result, network administrators had to update these signatures manually—a chore that took hours. Some UTM devices did not even come with the requisite drivers for managing updates. Instead, customers had to purchase separate tools to tackle this task.

Next-generation UTMs enable specialists to download signature updates and administer them across the network with the click of a button. The new devices also dispatch updates across the network, ensuring that every corner of the corporate computing environment has the latest and greatest protection against threats.

In many cases, the gateways automatically keep endpoints up to date, forcing downloads of the latest protections by quarantining users until they comply. This makes life for administrators easier.

"SonicWALL's family of network security appliances combines robust security services with high-speed deep packet inspection to provide organizations of all size the best protection. SonicWALL TZ and PRO Series appliances are designed reduce cost, risk and complexity by integrating automated and dynamic security capabilities for comprehensive protection and maximum performance," adds Shubhomoy Biswas, Country Manager (India), SonicWALL.

Advanced reporting

Updating a UTM device means nothing if the device lacks reporting features to demonstrate how the updates are getting the job done. These days, the very best UTM devices are equipped with advanced reporting features that enable network administrators to keep real-time tabs on overall performance. Provided the devices offer adequate extensibility and a good centralized management tool, the reporting interface should be able to deliver information about every security feature tied to the UTM.

Without a special decoder, this security information can be hard to digest. To combat this challenge, many of the newest UTM tools come with graphical reporting interfaces that make monitoring network security easy. Think of these interfaces as real-time status reports on network security, a sort of CNN for network health. In addition to giving constant data about perimeter defenses, the consoles also provide "headline" items to which network administrators should be alerted.

"UTM-1 from Check Point Software Technologies combines proven security into a solution that boasts centralized management, enhanced updateability and advanced reporting. It saves time. It saves energy. Perhaps most important, the tool keeps networks safe. With UTM-1, just about the only thing you will sacrifice is cost. At a time when IT budgets are shrinking, this is just about the only type of sacrifice worth making," informs Bhaskar Bakthavatsalu, Country Manager, Check Point Software Technologies – India & SAARC

UTM solutions are here to stay

UTM devices sure have come a long way since 2004. With the latest innovations in architecture, network administrators no longer have to settle for mediocre security in a centralized device. The approach of proven, next-generation UTMs mixes best-of-breed security with a variety of flexible features that is second to none. The new tools are easy to use, manage, update, and upgrade. UTMs of tomorrow also offer the highest standards of data privacy, applying the strongest encryption algorithms available today.

In India it is still a nascent market as far as security beyond antivirus goes. But with increased technical and educated crowd and not to mention, the increasing Internet population, it is experiencing tremendous growth in the UTM market.

The awareness has increased thus creating a huge potential and an accelerated growth.

Also, the booming IT and ITES market, the investors showing keen interest in Indian business, has paved way for the security business to experience an upward trend.

UTM is an emerging trend in the firewall appliance security market—an evolution of the traditional firewall into a product that not only guards against intrusion—but performs content filtering, spam filtering, intrusion detection and anti-virus duties traditionally handled by multiple systems. UTM is a compelling and natural consolidation point in the evolution of information asset protection. Part technology and part packaging, it responds to the growing challenge of protecting information assets in the 21st century.

However, in India, the UTM market is still growing. In desktop security, by combining desktop protection with gateway protection, you get the highest level of security possible which are protected from not only external attacks, but against those that start from within the network as well. Web and e-mail security solutions also form a part of the UTM umbrella of protection, with both inbound and outbound e-mail protection and a system that enforces your internal policies and compliance with relevant regulations.

UTM Solutions are here to stay

You are extremely busy typing away an important e-mail at a brisk speed to your client, when all of a sudden a pop-up from the right corner of your window announces—"Your system has been infected."

More often than not, one tends to ignore such warnings and continues to do his/her work and then one fine day- the SYSTEM CRASHES!

What do you do? How do you address a situation where you receive hundreds of spam and viruses into your emails and hang or slow down your systems? The answer lies in the ability to fight security breaches, which is easier said than done. Not long ago, companies analyzed this situation and fought myriad security troubles by using a blend of tools at their disposal, which proved to be costly and time-consuming exercise. Thus the eon of unfailing and super performance security solutions was born which is now popularly being talked about as Unified Threat Management (UTM).

The Information Technology (IT) icons such as Nagendra Venkaswamy, managing director, Juniper Networks, believe that the most efficient approach would be to unite UTM solutions at the branch locations with highly dedicated high-performance threat management devices at core central sites.

With UTM products becoming a preferred choice for most today, it is not as easy for anyone to go out and choose an UTM product for their companies, as the UTM products differ from vendor to vendor. For the uninitiated, an ideal UTM product would basically comprise of Intrusion detection systems (IDS)/ Intrusion prevention systems (IPS), anti-spyware and Gateway antivirus, anti-spam, firewall/VPN (Virtual Private Networks) in addition to web filtering and anti-phishing.

Manoj Chugh, president (India & SAARC region), EMC Data Storage Systems, also admits that threat can come from any quarters and one needs to get a backup of their data. "Today, network storage is being recognized as an industry and one needs to support it in a major way and also ensure that the enormous information is streamlined. The focus is today on the 'I' of the IT that is information," he feels.

Having the right UTM product means enjoying a comprehensive range of functionalities, including reactive mechanisms complemented by proactive ones and network-layer mechanisms by visibility and control at the network layer.

Ajit Pillai, country manager, WatchGuard, an eminent player in the UTM space, while talking about the market scenario in India averred that the market for security is growing at a rapid pace due to increased awareness, which in turn has augmented the security business in a major way.

"WatchGuard provides security solutions under their Firebox® X e-Series. Other companies such as Symantec, Elite Core, Fortinet, Sonic Wall and many more are operating in this space with their unique blend of offerings to suit the customer's security needs," says Pillai.

A true UTM device should meet the above requirements, as well as have the following specific features: VPN, multi-layered firewall, multi-method intrusion detection and prevention, multi-protocol antivirus, anti-spyware, anti-phishing, anti-spam, and Web filtering.

Nagendra Venkaswamy adds that every vendor would agree to the fact that the products work only when they have the ability to virtualize.

"This means that when you incorporate virtualization in any UTM offering, it helps the client to dispense diverse 'virtual' UTM devices into myriad user groups or network segments, which enables the system to be managed using a single interface.

Technologies that utilize the virtualization domain could include-- Virtual Routers, Security Zones, Virtual Systems, Virtual LANs (Local Area Networks) and many more," he says.

The UTM products will produce enormous effects on the company's potential in the fast growing markets today. For this the companies will have to employ a team that is fully working 24/7 on threat management in order to guard the enterprise against the e-enemies.

So that the next time you are busy typing an email to your client, you are not DISTURBED!