Monday 22 July 2013

The Sophistication In Malware

Malware writers tend to write for systems that are the mostly widely used. Malware writers recently began adopting these methods on a large scale to help lure users to open messages and click on attachments. That's why the malware terminology has evolved from basic Trojans, virus and spywares to crimewares, krugueware and so on
Malware
The main concept of scanners is to protect a system by catching malwares with signature database: they block only what they know. However, the experts in safety estimate that the authors of malwares constantly accentuate their efforts to encrust themselves in the mobile peripherals. Threats and Malwares are becoming more and more sophisticated. Another worrying trend is that many of these spy malwares also include multiple destructive capabilities. Installing and updating antivirus software which monitors communications and prevents unauthorized programs from being run remains the best form of protection against malwares.

The limits of signature database file protection are evident: -any programmer can create his own malware for his own goal: the less his tool is noisy, the more he has chance of success. Since a malware is not discovered in the wild, and reported or submitted, it can still unknown for a long time. -Antivirus is mostly designed to combat malwares, and not attacks. -even the most exhaustive malwares databases (Kaspersky for AVs and Webroot/Sunbelt for ASs) can't take the census of ALL available malwares. Current known Mac OSX malware count is even less with 7, so pretty much non-existent at the moment. With Microsoft Windows being dominant in the desktop market it is clear why the most malware is written for it.
Malware
Also, prior to Vista, the various Windows versions were pretty much wide open, full access, making it relatively easy for malware to abuse. If you use a webcam for online chatting, your computer may be at risk from a new strain of computer malware that gives hackers control of your webcam, enabling them to turn it on, capture video and send it back across the Internet. Mark Sinclair, Trend Micro technical services manager says, Malwares that allow hackers to peep through webcams are stealthy programs not easily detected by the average user. Besides, some malwares disable the sound card so that no sound will be heard when the camera is turned on.
If a notebook with an internal webcam is infected with one of these malwares, someone may be spying on you the next time you turn on your computer. In addition to malwares that take control of webcams, TrendLabs has also recently detected malwares that take screen shots of whatever programs are running on a computer. Another worrying trend is that many of these spy malwares also include multiple destructive capabilities. Installing and updating antivirus software which monitors communications and prevents unauthorized programs from being run remains the best form of protection against malwares.


Article Source: http://EzineArticles.com/753545

No comments:

Post a Comment