Internet Security Is Losing The Online War
Despite the efforts of the computer security industry, malicious software is reportedly spreading faster than ever and security researchers have acknowledged that they cannot seem to get ahead of the onslaught.
Internet security is broken and it appears that nobody knows quite how to fix it. This so-called malware surreptitiously takes over a PC then uses it to spread more malware to other machines exponentially. (Source: informationweek.com)
A conservative estimate by the Organization for Security and Cooperation in Europe says that as more businesses and people move onto the Web, criminals thriving on a sleazy economy of credit card thefts, bank fraud and other scams rob computer users of $100 billion a year. Criminals have built a well-financed computer underground by working in countries that have global Internet connections with authorities who have no desire to prosecute offenders. These criminals are bringing in significant amounts of foreign currency.
Researchers from the Georgia Tech Information Security Center reported that the percentage of online computers worldwide infected by botnets is likely to increase to 15 percent by the end of this year, up from 10 percent in 2007. Research compiled by PandaLabs suggests that a staggering number of infected computers, as many as 10 million, are being used to distribute spam and malware over the Internet each day. Because botnets distribute malware like worms, programs that are still relatively invisible to commercial antivirus software moves from computer to computer. Security researchers concede that their efforts are largely an exercise in futility.
Bruce Schneier, chief security technology officer for British Telecom, said that modern worms are stealthier and professionally written, that criminals have gone upmarket, and they're organized and international because there is real money to be made.
Criminals keep improving their malware and the sophistication of the programs in the last two years has begun to give them almost lifelike capabilities. For example, malware programs now infect computers and then routinely use their own antivirus capabilities to not only disable antivirus software but also remove competing malware programs.
Microsoft anti-malware researchers recently disassembled an infecting program and were stunned to discover that it was programmed to turn on the Windows Update feature after it took over the user's computers --- ensuring that it was protected from other criminal attackers. Microsoft has monitored a 43 percent jump in malware removed from Windows computers just in the last six months.
But there is a deeper impact than the billions of dollars lost in money and data. Many Internet executives fear that basic trust in what has become the foundation of 21st century commerce is rapidly eroding. Since more people depend on the Internet for a wide range of applications, including dealing with financial institutions, and the more we deal with those types of systems, the more vulnerable we become.
Cyber-criminals appear to be at least as technically advanced as the most sophisticated software companies, and they're faster and more flexible. As Windows and Macintosh become more secure, attackers have moved on to Web browsers and Internet-connected programs like Adobe Flash and Apple QuickTime to infect computers via 'drive-by downloads,' as they try to induce more users into clicking on web links contained in email messages to infect their computers.
Computer security firms have begun shifting from traditional antivirus program designs to web-based services which can be updated faster than antivirus programs installed on a user's computer because the global cycle of distributing security patches inevitably plays to the advantage of cyber-criminals who continually hunt for and exploit new backdoors and weaknesses in systems. Right now it appears that the bad guys are improving more quickly than the good guys.
BotHunter is a free passive network monitoring tool designed to recognize the communication patterns of malware-infected computers within your network perimeter than you can use to check your computer for botnets. BotHunter is available from BotHunter.net (Source: bothunter.net)
Visit Bill's Links and More for more great tips, just like this one!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.