How to safeguard against Trojan and Malware?
| Dear Customer, For the security of your Internet Banking account, it is important for you to know about viruses like Trojan and Malware. What is Trojan and Malware? Trojan is a computer program initiated by a fraudster, which often looks authentic like a game or utility. When executed, trojans gather confidential information without your knowledge and transmits information back to the fraudster. Malware is a software used by fraudsters to disrupt your computer operation, gather sensitive information, or gain access to the computer system. What is Trojan?Trojan is a program which often looks like a legitimate program such as a game or utility. It travels with another program which you may download from a website or receive as an attachment in an e-mail. When executed, Trojan scan gathers information about our computer (files, passwords, etc.) without our knowledge and transmits this information back to the fraudster who has sent the trojan. At times, this virus is designed specifically to capture credit card related data and build a mini- database at a pre-decided location for misuse by fraudsters. In extreme cases, Trojan can also give the fraudster complete access to our computer without our knowledge. Once this type of Trojan has been installed on our computer, the attacker can access and use our computer as if they were the real owner! A sample of the pop-up appearing on the infected screen is given below. How to safeguard against Trojan and Malware?
|
Malware is primarily designed to infiltrate systems and the access information stored on them for criminal, commercial or destructive purposes.
Malware varies greatly in both, form and functionality. Some malware is used to steal information such as credit card numbers, identities or sensitive business information from the computer it infects. Other malware may take over our computer and use it for attacking other systems. Alternatively, the malware may just be malicious, with a sole purpose to destroy or corrupt information on your computer
Malware is often present in e-mail attachments, or/and can be automatically downloaded and installed on your computer, when you click on links within e-mails.
Pop-Ups:
A fairly new tactic to spread malware is through the use of cleverly disguised pop- up adverts that appear as legitimate looking "Windows" alerts or messages.
Social Networking Sites:
Malware is increasingly spreading through social networking sites by installing dubious 3rd party add-on applications or by web links in messages. There is a false sense of security when using these sites, so you must remain vigilant at all times.
Software:
Malware located in legitimate looking software is one of the most common ways it is spread. Peer to Peer software and cracked or pirate software (e.g. 'warez'), often facilitate the spread of malware.
Computer Media:
Malware can be easily spread through the shared use of computer storage media such as DVDs, CDs and USB drives.
Mobile Devices:
Malware has been known to spread through mobile devices such as cell phones. As devices become more and more like mini computers, the threat of malware on these devices will increase.
Malware varies greatly in both, form and functionality. Some malware is used to steal information such as credit card numbers, identities or sensitive business information from the computer it infects. Other malware may take over our computer and use it for attacking other systems. Alternatively, the malware may just be malicious, with a sole purpose to destroy or corrupt information on your computer
How does Malware spread?
E-mail:Malware is often present in e-mail attachments, or/and can be automatically downloaded and installed on your computer, when you click on links within e-mails.
Websites:
Malware can be inadvertently downloaded from websites, or automatically downloaded while visiting some websites.
Malware can be inadvertently downloaded from websites, or automatically downloaded while visiting some websites.
Pop-Ups:
A fairly new tactic to spread malware is through the use of cleverly disguised pop- up adverts that appear as legitimate looking "Windows" alerts or messages.
Social Networking Sites:
Malware is increasingly spreading through social networking sites by installing dubious 3rd party add-on applications or by web links in messages. There is a false sense of security when using these sites, so you must remain vigilant at all times.
Software:
Malware located in legitimate looking software is one of the most common ways it is spread. Peer to Peer software and cracked or pirate software (e.g. 'warez'), often facilitate the spread of malware.
Computer Media:
Malware can be easily spread through the shared use of computer storage media such as DVDs, CDs and USB drives.
Mobile Devices:
Malware has been known to spread through mobile devices such as cell phones. As devices become more and more like mini computers, the threat of malware on these devices will increase.
How to protect your computer from Malware?
- Use a Firewall- Install and activate a personal firewall on your computer.
- Ensure your anti-virus and spyware detection software is updated regularly; daily if possible.
- Know what you are installing before you click 'install'.
- Do not enter your passwords, card details and codes in pop-up windows that may appear for no reason in the midst of your activity on any website or social websites.
- Log off from the session immediately on completing your activity.
- Ensure to do your online shopping on known and reputed websites only.
- Do not install any software that comes as an attachment via e-mail/web promotion.
- Run spyware checks on your computer frequently. A weekly scan is highly recommended.
- Never buy software in response to unexpected pop-up messages or e-mails
- Never click links in messages from unknown or untrusted contacts, and avoid clicking on message links sent from trusted contacts unless you are certain where it will lead you
- Never install unauthorized, unlicensed or unapproved software on your computer
- Do not insert untrusted computer media into your computer
- Be alert of unsolicited text or other message requests for software installs or links to unknown or untrusted locations
Source :- ICICI BANK

एक टिप्पणी भेजें