Wednesday, August 30

How Crackers Attack Networks

How Hackers attack networks


I thought it was inapt to address crackers as hackers or vice versa. Anyways, there's another little powerpoint slide to download. It has been named as "How Hackers attack Networks" by the author hence I used that heading. This little presentation will show you how crackers use different ways to get access to a compromised system and the tools and resources they use. You can download the "How hackers attack networks" zip file from PcSecurityWorld.com. You will require a utility like Winzip to unpack the zip file. | just in case you don't know ;-) |

Monday, August 28

Tracing a cracker online

How to trace a networked Pc using WhoEasy


Ever wondered how to determine the location of a computer from it's IP address?

An IP address tells a lot about an internet connected computer. It is the identity of networked connected pc by which other computers identify it. Every networked pc has an IP address assigned absence of which denotes that it is not connected.

Crackers try to sneak into your system or try to compromise your pc security also connect through some IP address. Here's a some piece of software that could help you to trace the pc to its location based on the IP address.

WhoEasy by Pcflank.com
WhoEasy finds the information about any computer in the world based on its IP address or name. Such info includes the name of the network provider, admin and network contact details such as city, state or province, country and even the phone number and street address!

WhoEasy is especially useful when you need to pinpoint a cracker attacking your computer and contact his ISP's abuse department to stop the illegal activity.

Key Features:
Discover who is hidden behind an IP address.
Learn more about the computers that try to connect to yours.
Get full contact info (even phone number and street address) of the Abuse department responsible for a particular cracker.

Although the software costs $14.95 at this time, you can download and evaluate it free for 30 days.

Get more information on Pcflank.com

10 Immutable Laws of Security

Microsoft Security Response Center's 10 laws of security

Microsoft Technet have formulated 10 immutable laws of security...Here's what they say...

"Here at the Microsoft Security Response Center, we investigate thousands of security reports every year. In some cases, we find that a report describes a bona fide security vulnerability resulting from a flaw in one of our products; when this happens, we develop a patch as quickly as possible to correct the error. (See "A Tour of the Microsoft Security Response Center"). In other cases, the reported problems simply result from a mistake someone made in using the product. But many fall in between. They discuss real security problems, but the problems don't result from product flaws. Over the years, we've developed a list of issues like these, that we call the 10 Immutable Laws of Security.

Don't hold your breath waiting for a patch that will protect you from the issues we'll discuss below. It isn't possible for Microsoft—or any software vendor—to "fix" them, because they result from the way computers work. But don't abandon all hope yet—sound judgment is the key to protecting yourself against these issues, and if you keep them in mind, you can significantly improve the security of your systems."

and here's the laws:

  • Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
  • Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
  • Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
  • Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more
  • Law #5: Weak passwords trump strong security
  • Law #6: A computer is only as secure as the administrator is trustworthy
  • Law #7: Encrypted data is only as secure as the decryption key
  • Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
  • Law #9: Absolute anonymity isn't practical, in real life or on the Web
  • Law #10: Technology is not a panacea

Read more on Microsoft Technet

Sunday, August 27

U.K. Tops European Spyware Infection Rate

U.K. Tops European Spyware Infection Rate


The United Kingdom has the highest spyware infection rate of any European country, security vendor Webroot has said in a new report.

The company's quarterly State of Spyware report, based on an international survey of enterprise and consumer PCs, found that spyware infections are again on the rise after a lull last year.

In 2004, many security experts said the spyware problem had reached its peak, and Webroot said it detected a slowdown in infections for the second half of 2005. No longer, however.

"The data we have culled during the past six months unequivocally show that spyware is anything but extinct," said Webroot chief executive C. David Moll in a statement.

"Spyware is a financially motivated threat, and as long as there is a dollar to be had, cybercriminals will do everything possible to steal it."

The United Kingdom took over from Ireland at the top of the spyware charts for the second quarter of 2006, with an average of 30.5 pieces of spyware per PC, Webroot said. Ireland followed with 30.3 spies per PC, Lithuania with 29.3 and Latvia with 26.5. The worldwide average was 24.5 spies per PC.

While Webroot and others say the targeting of English-language countries is a big factor upping the infection rate, the United States scored lower than the United Kingdom with an average of 30 spies per PC. Ireland, Lithuania and Latvia have scored high on the European list for several quarters because their expanding economies make them better targets, Webroot said.

The problem isn't confined to prosperous Western countries, however. In fact, Puerto Rico had the overall highest number of spyware infections detected per PC, with 42.6 per PC on average; Algeria had 38.4 and Bahrain had 35.7.

Consumers account for the highest proportion of infections, at 89 percent overall, but enterprises aren't immune. Based on scans of more than 19,000 enterprise PCs in 71 countries, mostly in the United States, Italy, the United Kingdom and Belgium, Webroot found that enterprise PCs had 19 spyware infections on average, down slightly from 21.5 the previous quarter.

Australia had the highest average number of spyware programs detected for enterprise PCs, at 37.7. Mexico hit 29.4 and Switzerland hit 21.4.

Among infected enterprise PCs scanned by Webroot, there were 1.3 Trojans present on average, and 40 companies over the past quarter said they'd suffered major security breaches due to spyware infections.

Since about 70 percent of enterprises use antispyware software, the relatively steady level of infections shows that the software in use might not be effective, Webroot said.

The company pinned the new increase in infections on the introduction of new attack vectors, including social networking sites such as MySpace, and the rise in junk e-mails loaded with spyware.

Another problem is that the free antispyware programs used by most of the public aren't capable of detecting spyware that uses advanced techniques such as rootkits, Webroot said.

-Matthew Broersma, Techworld.com (London)

Wednesday, August 23

Major Computer Attack Coming?

Security Flaw in Microsoft Windows Leaves Millions Vulnerable


The Department of Homeland Security released a statement Wednesday advising Windows PC owners across the nation to update their computers or face a potential attack from hackers.

"The Department of Homeland Security is recommending that Windows Operating Systems users apply Microsoft security patch MS06-040 as quickly as possible," the statement read. "This security patch is designed to protect against a vulnerability that, if exploited, could enable an attacker to remotely take control of an affected system."

Mike Murray, director of vulnerability research at the security firm nCircle, said the fact that DHS made this urgent plea is evidence that the threat is real.

"They realize that of all the vulnerabilities that have come out in the last year or two, this is definitely the most severe and the most likely to be attacked," he said.

Who's at Risk and What Can You Do?

Read full Article on ABC News

Saturday, August 19

Free Pc Security Tools

3 Little Free Pc Security Tools

If you are a Windows XP user and still surf the internet using Internet Explorer, you need to download these little pc security utilities to strengthen up your pc security a little bit. Here is what you need to have:

1. XP-AntiSpy - www.xp-antispy.org/index.php/lang-en
2. System Security Suite - www.igorshpak.net/
3. SpySites - camtech2000.net/Pages/Downloads.html

These are of course apart from your regular firewall, antivirus, antispyware software. The above free pc security utilities are just to enhance a protection a bit, not to work as a standalone malware combat software.

Keywords: Free Pc Security Tools, Pc Security utilities, Pc Security freeware, Freeware Pc Security Tools, Free Pc Security Software.

Wednesday, August 9

Internet Explorer 7 Beta 3: New features for security

Internet Explorer 7 Beta 3: New features for security


Internet Explorer 7 Beta 3, the latest version of the popular Web browser from Microsoft, provides new and more powerful security features to help protect your computer from viruses and spyware. Internet Explorer Beta 3 also displays visible warnings when your personal information might be at risk.

Protect your computer
Help protect your computer against spyware
Windows Defender (Beta 2) works with Internet Explorer 7 Beta 3 to help prevent spyware from sneaking onto your computer in common ways, for example, as part of a larger software download.
Help keep attackers out of your computer
ActiveX controls add valuable features, such as animation or pop-up menus, to Web pages. But Internet attackers can also use these controls in ways that they weren't intended to be used.

Internet Explorer 7 Beta 3 includes an ActiveX opt-in feature, which means that nearly all pre-installed ActiveX controls are off by default. You can still turn them on, however, through the Information Bar and the Add-on Manager. The Add-on Manager also allows you to turn off ActiveX controls once you've enabled them, or to delete them entirely.

Know when your security settings might be too low
The default security settings for Internet Explorer 7 Beta 3 provide you with a high level of security, while still enabling access to the Internet. However, some sites may require you to change your security settings to a lower level.

Read Complete Article here

Monday, August 7

Free ebook on Protecting your Pc from Spyware

How to protect yourself from Spyware

Here is what the author has to say:

"A good defense starts with a thorough understanding of your opponent’s offense. How to protect yourself from spyware teaches you what is spyware, how is it being distributed and installed and how to proctect from it. Our leading experts in information security show you not only how to discover spyware on your computer but what you can do to protect yourself against them. When it comes to securing your privacy, knowledge is power. This book gives you the knowledge to build a proper defense against spyware."

This is a 20 page ebook that tells you about Spywares, what spyware and adware can do and the different ways and channels by which your computer can get infected with spyware. You will also find some useful information on detecting the presence of spyware in your pc and getting rid of them in case it's found infected.

Download How to protect yourself from Spyware from PcSecurityWorld.com.

Friday, August 4

5 reasons to use Windows Live OneCare to help protect your computer

Protect your computer with Windows Live OneCare


Here is what microsoft's five reasons to using Windows Live OneCare to protect your computer from pc security threats.

You probably already know that it's a good idea to protect your computer from viruses, spyware, bugs, hackers, and other Internet threats, but it can be confusing and time-consuming to worry about whether you have all the latest protection features in place. It doesn't have to be anymore.

Windows Live OneCare is a comprehensive service that helps protect your computer from many different kinds of threats. It also helps you back up your important documents in case of emergency and runs regular tune-ups to help your computer run smoothly.

Best of all, it works in the background so you don't have to think about it.

This is what Windows Live OneCare does for your computer:

Regular antivirus scanning
Continuous firewall monitoring
Enhanced protection from spyware
Easy file backup and restore
Continuously updated

Read more in detail at Microsoft.com

Get to know Spywares

Information on Spywares



We all know Spyware programs are those crazy programs that keep on spying on your habits when you are online and send all the collected data back to their creators. They make the computer a good deal slow and watch out for your mouse clicks, keystrokes and a lot more things. Thinking like...

You should know more about spywares?
How to prevent them from infecting your computer?
How to get rid of them?

Maybe you should read this little report on Spywares and you know where to look out for when you need some of the very best antispyware programs and utilities -- PcSecurityWorld Antispyware software.