Wednesday, June 18, 2008

The Threat of Online Security: How Safe is our Data?

As Internet users display more of their personal information on social networking Web sites, and office workers upload more sensitive data to online software programs, computer hackers are employing increasingly sophisticated methods to pry that information loose. In many cases, they're devising small attacks that can fly under the radar of traditional security software, while exploiting the trust users place in popular business and consumer Web sites.

Some people or companies with malicious intentions write programs like computer viruses, worms, trojan horses and spyware. These programs are all characterised as being unwanted software that install themselves on your computer through deception. Trojan horses are simply programs that conceal their true purpose or include a hidden functionality that a user would not want. Worms are characterised by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software. Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.

Spyware is software that runs on a computer without the explicit permission of its user. It often gathers private information from a users computer and sends this data over the Internet back to the software manufacturer. Adware is software that runs on a computer without the owner's consent, much like spyware. However, instead of taking information, it typically runs in the background and displays random or targeted pop-up advertisements. In many cases, this slows the computer down and may also cause software conflicts.

The Online Danger

Many simply just do NOT understand the risks online. Over the last 24 months tens of thousands of computers around the world have been compromised and turned into a "zombie" computer that can be controlled by a remote user - and the PC owner does NOT even suspect a thing!

When a "remote user" (a criminal) wishes to launch an attack on a website, spread a new piece of spyware that steals personal data, send out spam e-mail and etc. They will use thousands of these "zombie" PC's as a group of computers, sometimes referred to as a "botnet", to achieve their task.

Things have got so organised now that high tech criminal gangs will approach the "owner" of these botnet's and pay them a fee to "rent" their services for a particular task. The biggest botnets can have tens of thousands of hijacked computers in them. Research suggests they can be hired from as little as 4 cents per machine!

The Solution?

I can not emphasise enough the importance of securing your computer! Would you leave your house and not secure it? No of course not yet the only reason these criminals can grab hold of your data in most cases is poor security on your part.

Always use Internet Explorer 7 or FireFox 2.0. Use anti-spyware like SpySweeper or Spyware Doctor (AVOID the free software as the stakes are now to high to rely on them, except Microsoft Windows Defender as they DO have the resources behind this product.)Use AntiVirus programs like McAffee AntiVirus. On at least a weekly basis update anti-virus and spyware products. Switch on the Windows firewall. Make sure updates to your operating system are installed. Make sure you are running XP Service Pack 2. Consider an all-in-one package like OneCare or McAfee Internet Security Suite. Take time to educate yourself and family about the risks. Always use passwords that contain numbers & letters and make them at least 8 to 12 characters long. Do NOT use familiar words such as a name in the password as these can easily be cracked. Monitor your computer and stay alert to threats. Remember the days of installing free software to protect you are long gone.

No comments: