IT Security Tips

IT Security Tips

NEW   Titanium Security For Netbooks 2012

Essential Protection

 

ANTIVIRUS
Proactively stops viruses before they reach you
   REAL-TIME UPDATES
Safeguards your PC from the latest Internet security threats
LIGHT ON MEMORY
Internet Security that won't slow you down

 

 

READ MORE ABOUT THE GREAT NEW PRODUCT FROM TREND MICRO

NEW   Titanium Maximum Security 2012

All in One Security – All the features of Titanium Internet Security, plus:

 

SOCIAL NETWORK SECURITY
Protects you from malicious link on social networking sites like Facebook, MySpace and Twitter
   WORKS WITH ANDROID
Extend your protection to your Android devices
10 GB ONLINE STORAGE
Protect, access and share your photo's, documents and more with a 10 GB SafeSync account

 

 

READ MORE ABOUT THE GREAT NEW PRODUCT FROM TREND MICRO

Deep Security By Trend Micro

Trend Micro Deep Security provides advanced protection for systems in the cloud. Deep Security combines intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to helps prevent data breaches and ensure business continuity. This dynamic, centrally managed solution also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA.

.

ALERT: THE HIDDEN DANGERS BEHIND YOUR FAVORITE SEARCH ENGINE. Hackers are exploiting search engines to infect your PCs and smart phones – do not let your company become the next victim. Join SANS for an educational webcast on May 26 – keynote by Peter Firstbrook, GARTNER.
Register here: http://www.sans.org/info/59023

According to various reports, in the past few days a large number of websites created using WordPress have been hacked. . Unconfirmed reports by WPSecurityLock suggest that other PHP-based management systems, such as the Zen Cart eCommerce solution, have also been targeted.

The hacked web pages appear to have been infected with scripts, which not only install malware on users’ systems, but also prevent browsers like Firefox and Google Chrome, which use Google’s Safe Browsing API, from issuing an alert when users try to access the page. When Google’s search bot encounters such a specially crafted page, the page responds by simply returning harmless code. This camouflage strategy takes advantage of the browser switch normally used by developers to return browser specific code to suit functional variations in different browser, such as Internet Explorer and Firefox.

Experts are currently still puzzled over which hole was actually exploited for the large-scale attack. The only thing that seems certain at this point is that the problem didn’t originate in WordPress, because if this was the case considerably more pages would have been infected. It is still unknown which version of wordpress are been attacked.

Today we decided it was time to put windows 7 to the test so we got Build 7100. The first decision was what type of PC or laptop I should use for the test. The two systems available were a new Toshiba Tecra M10 Laptop or a 6 year old Fujitsu Siemens Scaleo 600 PC.
From reading the Microsoft Speck and the info on this new version of windows Microsoft claims that it helps you PC to go faster. Ok, so let’s see if your PC runs faster so I decided to install it on the 6 year old PC with only 1 GB of memory.
The install appeared be quicker than an XP install. When the system came up for the first time and I saw the desktop I was impressed. The installation detected all hardware except for the sound and network diver so I have to install these devices manually. Then I went to windows updates to installed the latest updates.
So after I have got the all the latest updates, I started to try out the PC. Performance was impressive, and the new graphic look to windows 7 has a nice feel. Some things have changes so it will take everyone some time to adjust to the new look.
This is the first of many tests. I will be installing several devices, and different application to test the performance. From a security point of view Microsoft appear to have made a lot or improvements, but over the next 2 month I place this PC on test networks crawling with computer viruses, attack it with some of the latest hacking tools, and running high level security audits. So let’s see how windows 7 stand up to “Security I Trust” testing strategy.

Overall after the first day of installing and testing I was extremely impressed with Windows 7

Test System Details
6 year old Fujitsu Siemens Scaleo 600 PC
Processor: 3.20 gigahertz Intel Pentium 4
System Memory 1gb
HDD 160gb

Why Hackers attack Home PC

The average home use does not protect their PC from hackers because they have the belief that hackers would not be interested in anything they have on their PC. This incorrect thinking means the home user are assisting hackers by becoming perfect staging grounds for attacks.

Simply what this means is that hackers don’t want to get caught, so simply they take control of a non secure home PC use that home PC to generate the attack. Simply this mean that when the authorities trace the attacker they could come knocking on your door, and you may find your self in a position where you need to prove it was not you. So if you did not secure your PC how can you prove you did not cause the attack?

What do home users need to protect themselves from:

  • Password stealers
  • Key loggers
  • Spyware
  • Trojans
  • Online fraudsters
  • Identity thieves
  • Potential cyber criminals
  • Their PC been used as a staging point for an attack

To give you home PC basic protection you need a minimum of 3 layers of security. They are a Personal firewall, Antivirus and antispyware. If you don’t have a combination of all 3 products they you home PC does not have a basic level of Security.

Personal Firewall

At Security I Trust we do not consider that free firewall build into windows as an acceptable firewall to protect your PC.

Anti Spyware

  • CounterSpy.  (retail versions) Manufacturer: Sunbelt Software
  • Spybot – Search and Destroy (freeware)  A good Free program that program to protect your PC against spyware. It can detect and removes spyware, and relatively new kind of threat not yet covered by common anti-virus applications.

Antivirus Software

  • The two top recommended commercial antivirus product are Symantec (Norton) antivirus and ESET Nod32.
  • For home use you there is a free version of AVG anti-virus software available at http://free.avg.com/

All in One Internet Security Products

Of all the all in one Internet security products we have test there was only one that appeared to offer the home user adequate protection, that solution is Norton Internet Security, manufactured by Symantec

At "Security I Trust" we have tested the latest versions of the top 3 web browsers

  • Mozilla Firefox 3.5
  • Google Chrome 2.0
  • Internet Explorer 8

All 3 browsers were running in their manufactures default mode with the latest IT Security patches. Our tests were carried out from the point of view of Internet Security and how they protect the end user. The results from our test found Mozilla Firefox to provide the best protection for the end user. Out test were carried out by going to attack sites the run dangerous scripts against a pc in an attempt to steal personal information and/or download malware or Trojans.  When we accessed the dangerous website using the Firefox web browser many of these attack website failed to attack our Pc. Also what we liked about Firefox was under the help menu there is an option where the end user can easily report web forgery (phishing sites). This may not be a security feature, but this feature makes it much easier for the home user to report bad websites so that they action can be taken to have these websites blocked.

Firefox 3 or later contains built-in Phishing and Malware Protection to help keep you safe online. These features will warn you when a page you visit has been reported as a Web Forgery of a legitimate site (sometimes called “phishing” pages) or as an Attack Site designed to harm your computer (otherwise known as malware).