Zeus Banking Trojan now targets Firefox as well as IE

In the multitude of trojans spreaded in the wild these days, a special category named banking trojans as Zeus, Bzub or Torpig deserves the name of the most dangerous trojans for online banking transactions. The most known and scaring is Zeus and his features  include a Polymorphic Engine which make it able to re-encrypt itself each time he infects a computer, as a consequence the common detection methods based on virus binary signature are not for any help–each time the trojan has another signature. It’s true the Zeus trojan is around from 2005 year, but now he has new and scaring features. Until now, the trojan was able to hook …

Continue reading

Posted in Thoughts. Tagged with , .

General rules for preventing computer infections

-Always use an advanced security solution for your PC which must include at least a good AntiVirus, a good firewall and a Spam Filter; -Always update your Operating System, your Antivirus and your browser–very often the updates patch some vulnerabilities. -Never open an email received from an unknown person, or strange emails with strange subjects. Never run executables received by email attachements, even if it’s sent by a friend. His computer can be infected by a virus which read his Contacts entries saved in the computer or his emails from the Inbox and can send infected emails to all his contacts. And never ever reply to an email received from …

Continue reading

Posted in Thoughts.

Encryption software – Secure your data

TrueCrypt   The so-called “on-the-fly” encryption, is a method for encrypting and decrypting the files in RAM memory and only when them are used, as a result all the files on your encrypted partition or drive are permanently encrypted with an algorithm at your choice : AES-256, Serpent or Twofish. Can be used for any partition on your hard disk or for a storage device like an USB flash drive. It can creates a hidden volume or hidden Operating System that nobody knows it exists on your hard disk, it is created in the free space within another TrueCrypt volume for example but without modify the information about the free …

Continue reading

Posted in Tools & Reviews.

Run SandBoxed

This little application–Sandboxie–  create a virtual environment(think at virtualization provided by VMware) in your PC, where you can run your browser, install an applications or run an executable without to makes permanent changes on your harddisk. The programs are able to run normally because they have read access to any file in your PC, only writing procedure is intercepted by Sandboxie and redirected in a safe place on harddisk in a sandbox. No real files,  folders or registries are affected by the running programs in Sandboxie. When you empty the sandbox or you shutdown the computer all the sandbox content is deleted including that temporary files from sandbox. If you …

Continue reading

Posted in Tools & Reviews.

A better alternative for Windows System Restore

System Restore from Microsoft Windows creates a hidden folder in each partition with the name System Volume Information. There System Restore save all the important registry changes, save some deleted executable or dll files, save the computer settings for a certain moment called Restore Point, so if you want your computer restored to a earlier date in time, the information from System Volume Information folder is used. The big problem resides in fact that the viruses loves to hide themselves in this folder, due to the advantages it offers for viruses : this folder is hidden and protected by the system . There is two ways for viruses to infect …

Continue reading

Posted in Tools & Reviews.

Anti-Keyloggers tips

A simple tip to defeat an eventual keylogger is the next : When you type a password for example begin typing the latest characters, click in front of them and type the rest. For example if password is : 123456, type first 456, right click in front of them and type the rest: 123 The keylogger will record as password: 456123 obviously wrong. You can do this in 3 steps if you want dividing the password in 3 sets of characters. You can download if you want a free small anti-keylogger from here. KeyScrambler is an add-on for your browser that encrypt anything you have typed on your web browser …

Continue reading

Posted in Tools & Reviews.

Browser tips — Opera, Chrome or Firefox

Maybe you will wonder to find out that I recommend you to use as web-browser Opera , Chrome or even Microsoft Internet Explorer 8. The last one, was declared after a study made by NSS Labs, a product analysis company, as the most resistant browser against  social engineering malware. General speaking, a social engineering malware is a Web address appearing as an inoffensive page with,  for example a video embedded, that download and execute a malicious code into your computer automatically when viewing the video or tricking the users to download an apparent harmless file  like a PDF . Another social engineering malware is when a friend with an infected computer send …

Continue reading

Posted in Thoughts.