Tuesday, November 22, 2011

Top 10 Ways to Defend Against Malware and Trojans



Top 10 Ways to Defend Against Malware and Trojans 



Although hackers never stop developing new tricks to commit fraud and 
steal identities, consumers can take some measures to safeguard their 
systems. All it takes is a combination of good security software and a 
commitment to following basic safety rules. 

1.  Protect your computer with strong security software and make 
sure to keep it up to date.  Many security software's provides trusted PC 
protection from Trojans, hackers, spyware, and more. Its integrated 
anti-virus, anti-spyware, firewall, anti-spam, and anti-phishing work 
together to combat today’s advanced multi-faceted attacks. It scans 
disks, email attachments, files downloaded from the web, and 
documents generated by word processing and spreadsheet programs. 

2.  Use a security-conscious Internet service provider (ISP) that 
implements strong anti-spam and anti-phishing procedures.  

3.  Enable automatic Windows® updates or download Microsoft® 
updates regularly to keep your operating system patched against 
known vulnerabilities. Install patches from other software 
manufacturers as soon as they are distributed. A fully patched 
computer behind a firewall is the best defense against Trojan and 
spyware installation. 


4.  Use extreme caution when opening attachments. Configure your
anti-virus software to automatically scan all email and instant message
attachments. Make sure your email program doesn’t automatically
open attachments or automatically render graphics, and ensure that
the preview pane is turned off. This will prevent macros from executing.
Refer to your program’s safety options or preferences menu for
instructions. Never open unsolicited business emails, or attachments
that you’re not expecting—even from people you know.


5.  Be careful when engaging in peer-to-peer (P2P) file-sharing.
Trojans sit within file sharing programs waiting to be downloaded. Use
the same precautions when downloading shared files that you do for
email and IM. Avoid downloading files with the
extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd. Anti-virus
software and a good firewall will protect your system from malicious
files.

6.  Download the latest version of your browser to ensure that it is
also fully updated and utilizes the latest technologies to identify and
filter out phishing sites that can install Trojans.

7.  Use security precautions for your PDA, cell phone, and Wi-Fi
devices. Trojans arrive as an email/IM attachment, are downloaded
from the Internet, or are uploaded along with other data from a desktop.
Cell phone viruses are in their infancy, but will become more common
as more people buy phones with advanced features. Anti-virus
software is available for PDAs and cell phones.

8.  Configure your instant messaging application correctly. Make
sure it does not open automatically when you fire up your computer.
Turn off your computer and disconnect the DSL or modem line when
you’re not using it. Beware of spam-based phishing schemes—don’t
click links in emails or IM.

9.  Be certain a web site is legitimate before you go there. Use
software that automatically checks this, such as AccountGuard from
eBay and ScamBlocker from Earthlink. You can also check the validity
of individual web addresses (URLs) with a WHOIS search such as
http://www.DNSstuff.com.

10. Back up your files regularly and store the backups somewhere
besides your PC. If you fall victim to a Trojan attack, you can recover
your photos, music, movies, and personal information like tax returns
and bank statements.




0 comments:

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Vamshi krishnam raju | Bloggerized by Vamshi krishnam raju - Vamshi krishnam raju | Vamshi krishnam raju