Use antivirus software
Antivirus software helps protect your computer from viruses or other malicious software.
Microsoft Windows does not come with antivirus software. You must purchase and install it
separately.
To find out if you already have antivirus software or to purchase antivirus software from
Microsoft, click the link that corresponds to the operating system you use.
* Windows Vista
* Windows XP Service Pack 2 (SP2)
* Windows XP
* Windows 2000
* Windows Vista
Your computer might already have antivirus software. If you don't have antivirus software
installed, Windows Security Center should alert you in the notification area at the bottom of
your screen.
You can also find out if you already have antivirus software installed by clicking the Start
button and pointing to All Programs. Then look for an antivirus program.
Many major computer manufacturers include at least a trial version of a popular antivirus
software package, such as McAfee or Symantec. But just because the software is installed,
doesn't mean it's turned on or being updated regularly.
If your antivirus software is not up-to-date, Windows Security Center should alert you in the
notification area at the bottom of your screen. To help ensure that your software is
up-to-date, open your antivirus program from the Start menu or the taskbar notification area
and look for update status. If you still aren't sure if your antivirus software is up-to-date,
contact your antivirus software provider.
If you don't see antivirus software or if Windows Security Center tells you that your
antivirus software is not up-to-date, you should download or purchase new antivirus software
or update yours.
* Windows XP Service Pack 2 (SP2)
Windows XP does not come with antivirus software. If you want to scan your computer for
viruses, malware, or other unwanted software you have two free options from Microsoft:
* Windows Live safety scanner. The safety scanner checks for and removes viruses, eliminates
junk on your hard drive, and improves your PC's performance.
* Malicious Software Removal Tool. Checks computers for infections by specific, prevalent
malicious software and helps remove any infection found.
For links to other antivirus programs that work with Microsoft, see Microsoft Help and
Support List of Antivirus Vendors.
Windows 2000
Windows 2000 does not come with antivirus software. To try antivirus software from another
company, see Windows Marketplace.
Friday, October 9, 2009
Friday, October 2, 2009
Thursday, October 1, 2009
Bluetooth
Avoid wireless attacks through your Bluetooth mobile phone
Bluetooth® wireless technology is included with many mobile phones and personal digital assistants (PDAs).
Here are some examples of the use of Bluetooth:
Any time you transmit information online, you can be vulnerable to online attack; and as the popularity of Bluetooth increases, so does its interest to cybercriminals.
How criminals attack through Bluetooth technology
When it's set to "discoverable" mode, your Bluetooth mobile phone or PDA sends a signal indicating that it's available to "pair" with another Bluetooth gadget and transmit data back and forth.
However, an attacker who detects this signal could also attempt to pair with your device and hack in to steal your personal identification number (PIN).
ou could remain unaware, while the attacker, with your PIN in hand, could be:
Criminals have also been known to drive around with Bluetooth detectors, looking for mobile phones and PDAs to infiltrate; and to outfit laptop computers with powerful antennas in order to pick up Bluetooth signals from as far as a half-mile away.
The latest forms of high-tech attack even include forcing Bluetooth devices to pair with the attacker's device when they are not in the discoverable mode. (It's also very labor-intensive, so targets tend to be individuals known to have a very large bank account or hold expensive secrets.)
Tips to improve your Bluetooth security
Source: Microsoft
Bluetooth® wireless technology is included with many mobile phones and personal digital assistants (PDAs).
Here are some examples of the use of Bluetooth:
- Hands-free headsets for mobile phones
- wireless keyboards
- wireless mice
- wireless printers
- wireless game controllers
Any time you transmit information online, you can be vulnerable to online attack; and as the popularity of Bluetooth increases, so does its interest to cybercriminals.
How criminals attack through Bluetooth technology
When it's set to "discoverable" mode, your Bluetooth mobile phone or PDA sends a signal indicating that it's available to "pair" with another Bluetooth gadget and transmit data back and forth.
However, an attacker who detects this signal could also attempt to pair with your device and hack in to steal your personal identification number (PIN).
ou could remain unaware, while the attacker, with your PIN in hand, could be:
- Stealing information stored on your device, including contact lists, e-mail, and text messages.
- Sending unsolicited text messages or images to other Bluetooth-enabled devices.
- Accessing your mobile phone commands, which allows the attacker to use your phone to make phone calls, sent text messages, read and write phonebook contacts, eavesdrop on conversations, and connect to the Internet.
- Installing a virus on your device that could wreak the same kind of havoc that a virus could on your computer—for example, slowing or disabling your service, or destroying or stealing information.
Criminals have also been known to drive around with Bluetooth detectors, looking for mobile phones and PDAs to infiltrate; and to outfit laptop computers with powerful antennas in order to pick up Bluetooth signals from as far as a half-mile away.
The latest forms of high-tech attack even include forcing Bluetooth devices to pair with the attacker's device when they are not in the discoverable mode. (It's also very labor-intensive, so targets tend to be individuals known to have a very large bank account or hold expensive secrets.)
Tips to improve your Bluetooth security
- Keep your Bluetooth setting to "non-discoverable" (transmission-disabled) and only switch it to "discoverable" when you're using it.
Just leaving your mobile phone or PDA in the discoverable mode keeps it dangerously open for Bluetooth transmission—a Bluetooth user within up to a 30-foot range can receive your signal and potentially use it to access your device as you walk around town, drive, or even walk through your office. - Use a strong PIN code. Codes of five digits or longer are harder to crack.
- Avoid storing sensitive data such as your social security number, credit card numbers, and passwords on any wireless device.
- Stay up-to-date on Bluetooth developments and security issues, and regularly check with the manufacturer of your device for news on software updates or any specific security vulnerabilities.
Source: Microsoft
Help prevent IM viruses
Help avoid instant message viruses
Using an instant messaging (IM) program—such as Windows Live Messenger (formerly MSN Messenger), Windows Messenger, AOL Instant Messenger, Yahoo Messenger, or others—you and a friend can type messages to each other and see the messages almost immediately.
Because IM is so popular, virus writers can use it to spread malicious programs.
Understanding instant message viruses
Like e-mail viruses, instant message viruses are malicious programs that are designed to travel through IM.
These viruses are spread, in most cases, when a person clicks a link or opens an infected file that was sent in an instant message that appeared to come from a friend.
When you open one of these files, your computer can become infected with a virus. Because of the virus, your computer may slow down or stop responding, or you may not notice any change at all.
However, the virus might have installed a covert program on your computer that could damage software, hardware, or important files, and that may include spyware, which can track information entered on the computer.
A computer infected by a virus may continue to spread the infection by sending copies of the virus to everyone on your IM contact list, that is, the collection of IM names that you can store in your IM program.
5 steps to help avoid instant message viruses
As with most threats on the Internet, you can help keep yourself safe by taking basic precautions. If you know how to avoid e-mail viruses, you'll already be familiar with many of these steps.
1- Be careful with links and files in IM. Never click a link or open, accept, or download a file in IM from someone you don't know. If the link or file is in an IM from someone you do know, don't click the link or open the file unless you know what the link or file is and you were expecting it. Contact the sender by e-mail, phone, or some other method to confirm that what they sent was not a virus.
2- Update your Windows software. Visit Microsoft Update to scan your computer and install any high-priority updates that are offered to you. If you use automatic updating, the updates are delivered to you when they are released, but you have to make sure you install them.
3- Make sure you're using an updated version of your IM software. Using the most up-to-date version of your IM software can better protect your computer against viruses and spyware. If you're using MSN Messenger, upgrade to Windows Live Messenger, which will block attachments that might contain malware and allow you to scan attachments for viruses. For more information, see Windows Live Messenger Overview.
4- Use antivirus software and keep it updated. Antivirus software can help to detect and remove IM viruses from your computer, but only if you keep the antivirus software current. If you've purchased a subscription from an antivirus software company, your antivirus software may update itself when you're connected to the Internet.
5- Use antispyware software and keep it updated. Some IM viruses may install spyware or other unwanted software on your computer. Antispyware software can help to protect your computer from spyware and remove any spyware you may already have. If you don't have antispyware software, you can download Windows Defender. Windows Defender comes with Windows Vista. If you use Windows XP SP2, you can download Windows Defender for no charge.
Source: Microsoft
Using an instant messaging (IM) program—such as Windows Live Messenger (formerly MSN Messenger), Windows Messenger, AOL Instant Messenger, Yahoo Messenger, or others—you and a friend can type messages to each other and see the messages almost immediately.
Because IM is so popular, virus writers can use it to spread malicious programs.
Understanding instant message viruses
Like e-mail viruses, instant message viruses are malicious programs that are designed to travel through IM.
These viruses are spread, in most cases, when a person clicks a link or opens an infected file that was sent in an instant message that appeared to come from a friend.
When you open one of these files, your computer can become infected with a virus. Because of the virus, your computer may slow down or stop responding, or you may not notice any change at all.
However, the virus might have installed a covert program on your computer that could damage software, hardware, or important files, and that may include spyware, which can track information entered on the computer.
A computer infected by a virus may continue to spread the infection by sending copies of the virus to everyone on your IM contact list, that is, the collection of IM names that you can store in your IM program.
5 steps to help avoid instant message viruses
As with most threats on the Internet, you can help keep yourself safe by taking basic precautions. If you know how to avoid e-mail viruses, you'll already be familiar with many of these steps.
1- Be careful with links and files in IM. Never click a link or open, accept, or download a file in IM from someone you don't know. If the link or file is in an IM from someone you do know, don't click the link or open the file unless you know what the link or file is and you were expecting it. Contact the sender by e-mail, phone, or some other method to confirm that what they sent was not a virus.
2- Update your Windows software. Visit Microsoft Update to scan your computer and install any high-priority updates that are offered to you. If you use automatic updating, the updates are delivered to you when they are released, but you have to make sure you install them.
3- Make sure you're using an updated version of your IM software. Using the most up-to-date version of your IM software can better protect your computer against viruses and spyware. If you're using MSN Messenger, upgrade to Windows Live Messenger, which will block attachments that might contain malware and allow you to scan attachments for viruses. For more information, see Windows Live Messenger Overview.
4- Use antivirus software and keep it updated. Antivirus software can help to detect and remove IM viruses from your computer, but only if you keep the antivirus software current. If you've purchased a subscription from an antivirus software company, your antivirus software may update itself when you're connected to the Internet.
5- Use antispyware software and keep it updated. Some IM viruses may install spyware or other unwanted software on your computer. Antispyware software can help to protect your computer from spyware and remove any spyware you may already have. If you don't have antispyware software, you can download Windows Defender. Windows Defender comes with Windows Vista. If you use Windows XP SP2, you can download Windows Defender for no charge.
Source: Microsoft
Help prevent rogue security software
Watch out for fake virus alerts
Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions.
How does rogue security software get on my computer?
Rogue security software designers create legitimate looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the Web.
The “updates” or “alerts” in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or
spyware. When you click, the rogue security software downloads to your computer.
Rogue security software might also appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer.
What does rogue security software do?
Rogue security software might report a virus, even though your computer is actually clean. The
software might also fail to report viruses when your computer is infected. Inversely, sometimes,
when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect.
Some rogue security software might also:
Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).
Use social engineering to steal your personal information.
Install malware that can go undetected as it steals your data.
Launch pop-up windows with false or misleading alerts.
Slow your computer or corrupt files.
Disable Windows updates or disable updates to legitimate antivirus software.
Prevent you from visiting antivirus vendor Web sites.
Rogue security software might also attempt to spoof the Microsoft security update process. Here's an example of rogue security software that's disguised as a Microsoft alert but that doesn't come from Microsoft.
For more information about this threat, including analysis, prevention and recovery, see the Trojan:Win32/Antivirusxp entry in the Microsoft Malware Protection Center encyclopedia.
Another common rogue security program is FakeSecSen:
For more information about this threat, including analysis, prevention and recovery, see the Program:Win32/FakeSecSen entry in the Microsoft Malware Protection Center encyclopedia.
Here is the legitimate Microsoft Windows Security Center:
To help protect yourself from rogue security software:
Install a firewall and keep it turned on.
Use automatic updating to keep your operating system and software up to date.
Install antivirus and antispyware software and keep it updated. For links to other antivirus programs that work with Microsoft, see Microsoft Help and Support List of Antivirus Vendors.
If your antivirus software does not include antispyware software, you should install a separate antispyware program such as Windows Defender and keep it updated. (Windows Defender is available as a free download for Windows XP and is included in Windows Vista.)
Use caution when you click links in e-mail or on social networking Web sites.
Familiarize yourself with common phishing scams.
If you think you might have rogue security software on your computer:.
Scan your computer. Use your antivirus software or do a free scan with Windows Live safety scanner. The safety scanner checks for and removes viruses, eliminates junk on your hard drive,
and improves your PC's performance.
Check your accounts. If you think you might have entered sensitive information, such as credit card numbers or passwords into a pop-up window or at a rogue security software site, you should monitor your associated accounts. For additional information, see What to do if you're a victim of fraud.
Call PC Safety. Microsoft provides free virus and spyware removal support to Windows customers who think they have an infected computer or have other PC Security questions.
Customers should call 1-866-PC Safety for phone support which is available 24 hours a day 7 days a week.
Customers can also visit http://safety.live.com for free online virus and spyware removal.
If you suspect that your computer is infected with rogue security software that is currently not detected with Microsoft security solutions, you can submit samples using the Microsoft Malware Protection Center submission form. For help with isolating undetected samples, call PC Safety.
Source: Microsoft
Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions.
How does rogue security software get on my computer?
Rogue security software designers create legitimate looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the Web.
The “updates” or “alerts” in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or
spyware. When you click, the rogue security software downloads to your computer.
Rogue security software might also appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer.
What does rogue security software do?
Rogue security software might report a virus, even though your computer is actually clean. The
software might also fail to report viruses when your computer is infected. Inversely, sometimes,
when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect.
Some rogue security software might also:
Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).
Use social engineering to steal your personal information.
Install malware that can go undetected as it steals your data.
Launch pop-up windows with false or misleading alerts.
Slow your computer or corrupt files.
Disable Windows updates or disable updates to legitimate antivirus software.
Prevent you from visiting antivirus vendor Web sites.
Rogue security software might also attempt to spoof the Microsoft security update process. Here's an example of rogue security software that's disguised as a Microsoft alert but that doesn't come from Microsoft.
For more information about this threat, including analysis, prevention and recovery, see the Trojan:Win32/Antivirusxp entry in the Microsoft Malware Protection Center encyclopedia.
Another common rogue security program is FakeSecSen:
For more information about this threat, including analysis, prevention and recovery, see the Program:Win32/FakeSecSen entry in the Microsoft Malware Protection Center encyclopedia.
Here is the legitimate Microsoft Windows Security Center:
To help protect yourself from rogue security software:
Install a firewall and keep it turned on.
Use automatic updating to keep your operating system and software up to date.
Install antivirus and antispyware software and keep it updated. For links to other antivirus programs that work with Microsoft, see Microsoft Help and Support List of Antivirus Vendors.
If your antivirus software does not include antispyware software, you should install a separate antispyware program such as Windows Defender and keep it updated. (Windows Defender is available as a free download for Windows XP and is included in Windows Vista.)
Use caution when you click links in e-mail or on social networking Web sites.
Familiarize yourself with common phishing scams.
If you think you might have rogue security software on your computer:.
Scan your computer. Use your antivirus software or do a free scan with Windows Live safety scanner. The safety scanner checks for and removes viruses, eliminates junk on your hard drive,
and improves your PC's performance.
Check your accounts. If you think you might have entered sensitive information, such as credit card numbers or passwords into a pop-up window or at a rogue security software site, you should monitor your associated accounts. For additional information, see What to do if you're a victim of fraud.
Call PC Safety. Microsoft provides free virus and spyware removal support to Windows customers who think they have an infected computer or have other PC Security questions.
Customers should call 1-866-PC Safety for phone support which is available 24 hours a day 7 days a week.
Customers can also visit http://safety.live.com for free online virus and spyware removal.
If you suspect that your computer is infected with rogue security software that is currently not detected with Microsoft security solutions, you can submit samples using the Microsoft Malware Protection Center submission form. For help with isolating undetected samples, call PC Safety.
Source: Microsoft
How to remove computer worms
A computer worm, such as the Conficker worm, is like a computer virus, but it can spread by itself without your interaction.
If you think you have a computer worm, use one or both of these tools to scan your computer and help get rid of it:
1- Windows Live safety scanner
2- Malicious Software Removal Tool
Note: If your computer is infected with the Conficker worm, you might not be able to connect to these or other recovery tools.
For more detailed information, see Protect yourself from the Conficker computer worm.
Source: Microsoft
If you think you have a computer worm, use one or both of these tools to scan your computer and help get rid of it:
1- Windows Live safety scanner
2- Malicious Software Removal Tool
Note: If your computer is infected with the Conficker worm, you might not be able to connect to these or other recovery tools.
For more detailed information, see Protect yourself from the Conficker computer worm.
Source: Microsoft
How to prevent computer worms
A computer worm is designed to spread from computer to computer without your interaction. You might have heard of worms like Conficker, Sasser, and Blaster.
To help prevent getting infected by computer worms, follow these four steps:
1- Keep your firewall turned on.
2- Keep your operating system up-to-date with security updates.
3- Use updated antivirus software from a trusted source.
4- Use strong passwords, especially on your network.
Also, use caution before you open e-mail attachments, click links in e-mail, or before you accept file transfers.
Never open e-mail attachments from someone you don't know and avoid opening e-mail attachments from someone you do know, unless you are aware of exactly what the attachments are. The sender might not know that the attachment contains a worm.
Source: Microsoft
To help prevent getting infected by computer worms, follow these four steps:
1- Keep your firewall turned on.
2- Keep your operating system up-to-date with security updates.
3- Use updated antivirus software from a trusted source.
4- Use strong passwords, especially on your network.
Also, use caution before you open e-mail attachments, click links in e-mail, or before you accept file transfers.
Never open e-mail attachments from someone you don't know and avoid opening e-mail attachments from someone you do know, unless you are aware of exactly what the attachments are. The sender might not know that the attachment contains a worm.
Source: Microsoft
Subscribe to:
Comments (Atom)
