Microsoft has jumped on the on-demand malware scanner bandwagon by launching a new, free virus/malware scanner that’s designed to be used if you think your computer might be infected. It’s called Microsoft Safety Scanner and is a portable app, so no installation is required. Here’s what Microsoft has to say about it:
The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.
Note: The Microsoft Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again.
This appears to be a variation of the Malicious Software Removal Tool (MSRT) that Microsoft runs on your system each month if you have automatic updates turned on. From what I can determine, the Microsoft Safety Scanner (MSS) is simply an on-demand version of Microsoft Security Essentials (MSE) that also targets some of the specific MSRT targets. I guess that makes sense in some way? Why wouldn’t you just use MSE and turn on automatic updates? Seems like the same effect.
Some people have noted that McAfee has a comparable tool, also free, called Stinger. Trend Micro, Symantec, and Malware Bytes also offer on-demand scanners. Also noted is that MSS is a 67 MB download while Stinger is just under 8 MB. Why such a disparity? Does this indicate that MSS has a much larger malware signature file, or is it just typical Microsoft bloat?
I don’t plan on testing MSS, so if you have any comments on your experiences with it, please leave them here.
Authentication: Determining whether someone or something is who or what it is declared to be. Is that really “mom” logging into your computer or some hacker?
Strong (unguessable) Password: A password that has been deliberately composed to be difficult or impossible for a person or a program to discover. The longer, and more random, the stronger (and more unguessable) the password.
Password Cracker: A program designed to discover passwords. These programs are often used by Sys Admins to discover forgotten user passwords. The program can be designed to use brute force or dictionary discovery. While a useful admin tool, these are what hackers use to steal information.
PIN: Personal Identification Number, often used in conjunction with a password to provide an additional security factor. They are most commonly used with ATM cards.
Single Sign-on (SSO): An authentication system that allows a single username/password combination to be used to access multiple applications. Often used in corporate environments so that a person who uses multiple applications doesn’t have to log into each one separately when switching between them.
Identity Chaos: According to this article, it is “…a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices. To further complicate matters, each of the user’s passwords may be subject to different rules, allow access at different security levels, and expire on different dates. Such a situation can lead to security risks. Because people have to remember so many different passwords, they may choose very simple ones and change them infrequently.
Phishing: A fraud method that utilizes official-looking email purporting to be from a financial institution or government agency in an attempt to trick you into entering sensitive information at a fake website. Be suspicious of any official-looking e-mail message that asks for updates on personal or financial information and never click on links in such messages. No legitimate organization will send you an email asking for personal information.
Social Engineering: When someone using personal contact via telephone or face-to-face runs a con game to secure personal information. The social engineer will often pose as a tech support or help desk contact for your company.
Worm: A kind of malware that is often sent in email attachments and replicates itself on the user’s system and the local network, using up system resources and bogging down the system.
Shoulder Surfing: This is someone literally looking over your shoulder to discover what you are typing into online forms, bank logins, your ATM machine, etc.
The recent breach of Epsilon, an email marketing services company, emphasizes the fallacy of Online Privacy. There just is no such thing. But what do you do when you have trusted your private information to firms and financial institutions you deal with and someone breaches the security of the databases where that information is stored?
While the Epsilon breach reportedly only involved names and email addresses, not financial information, you should know how to deal with more serious data breaches where your personal financial information may be at risk. Here are five steps to take if you are notified of such a situation:
- Immediately change the passwords on all of your banking, credit card, and other online payment accounts and be sure they are all different. Do not use the same password for all of them and make sure the new passwords are unguessable.
- Change the passwords on any email accounts that you use for transacting business online.
- Be very alert to any phishing attempts arriving in your email the pretend to be from the affected accounts and monitor your accounts closely for unauthorized activity.
- If you suspect any unauthorized activity, immediately contact the financial institution. They will work with you to resolve any issues.
- Educate yourself on, or review the actions you should take in the event your identity is stolen, or if you suspect it has been. The FTC publishes an excellent guide: Take Charge: Fighting Back Against Identity Theft.
Please note that there is a big difference between simple fraud and identity theft. A data breach of any kind could lead to both. Someone using your stolen credit card is not the same thing as someone using your name, Social Security number (or other government-issued identity numbers), and other personal information to open credit accounts in your name, nor is it the same as someone posing as you to access your bank accounts.
Watch this video and find out why security is important both outside and inside the network.
[kml_flashembed movie="http://www.youtube.com/v/YyvpS44B_YQ" width="425" height="350" wmode="transparent" /]
I haven’t seen this one, but it seems to be quite nasty. The latest issue of Windows Secrets alerted me to it. Fred Langa posted a blow-by-blow account of an infection: http://windowssecrets.com/links/qivu6yl5kstcd/3a87b0h/
A nasty piece of malware known as LizaMoon has hijacked links on millions of websites in the past weeks, including some normally safe iTunes and Google links.
Fortunately, LizaMoon is easy to avoid if you know what to look for.
Using rogue-AV scare tactics, LizaMoon tries to trick you into running bogus security-scan and virus-cleanup tools on your PC — but it’s pure malware.
If allowed onto your PC, this particular ploy is especially troublesome because it can partially disable the Windows Security Center and change the Registry so that the full WSC can’t be restarted. It also interferes with Microsoft Security Essentials, if MSE is running. (You’ll find lots more LizaMoon news coverage via Google.)
Supposedly, infection peaked in October of 2010 at around 5600 affected sites, but it’s making a comeback, according to Langa. These things never really go away completely and often resurface. Be especially aware when searching sites on Google.
OpenCandy (OC), a relatively new advertising product is currently being bundled with software installers for popular programs including IZArc, mirC, PrimoPDF, Trillian Astra and more. As always happens with “new” methods of advertising via bundling agreements, OC is generating quite a bit of controversy in various forums and blogs. Some say it is benign adware under control of the person running the installer, others say it has the potential to be malicious spyware. I have no personal experience with OC, so I did some investigation by seeing what the OpenCandy folks had to say:
OpenCandy provides a plug-in that developers include in their software to earn money by showing recommendations for other software in their installers. Developers use this money to keep their software free and invest in further software development.
The installer uses the OpenCandy plug-in to present a software recommendation (such as the one below) during installation. You have complete control to accept the software recommendation by selecting either the “Install” or “Do not install” options on the software recommendation screen.
OpenCandy isn’t installed onto your computer, doesn’t collect personally identifiable information about you, and doesn’t collect information about your web browsing habits. It is safe, secure, and used by hundreds of software developers, including many of the world’s largest anti-virus companies. Several of our partners are listed here: http://opencandy.com/discover/.
IF this is true, then it looks like OC is benign. Check out the partners at the URL above, then you decide. Other forum members at Dave’s Computer Tips seem to agree with me:
ozbloke: I believe OpenCandy, as it now stands, is relatively harmless adware; on the proviso that the software distributors who bundle it with their products stick to a regimen of full disclosure and and employ an opt-out system. However, the potential for abuse is somewhat disturbing and I would like to see some more concrete assurances/guarantees in place.
As always, caveat emptor.
I have not been able to verify whether or not Kroger uses the same email services vendor, Epsilon Interactive, as U.S. Bank (see U.S. Bank Vendor Epsilon Interactive Hacked), but got this notice as well:
Kroger wants you to know that the data base with our customers’ names and email addresses has been breached by someone outside of the company. This data base contains the names and email addresses of customers who voluntarily provided their names and email addresses to Kroger. We want to assure you that the only information that was obtained was your name and email address. As a result, it is possible you may receive some spam email messages. We apologize for any inconvenience.
Kroger wants to remind you not to open emails from senders you do not know. Also, Kroger would never ask you to email personal information such as credit card numbers or social security numbers. If you receive such a request, it did not come from Kroger and should be deleted.
Wonder how many other notices I’ll be getting?
If you are a customer of U.S. Bank better be on the lookout for suspicious emails. It seems one the bank’s vendors of email marketing services, Epsilon Interactive, has been hacked and your email address may have been obtained in the process.
My wife got this email notice yesterday:
As a valued U.S. Bank customer, we want to make you aware of a situation that has occurred related to your email address.
We have been informed by Epsilon Interactive, a vendor based in Dallas, Texas, that files containing your email address were accessed by unauthorized entry into their computer system. Epsilon helps us send you emails about products and services that may be of interest to you.
We want to assure you that U.S. Bank has never provided Epsilon with financial information about you. For your security, however, we wanted to call this matter to your attention. We ask that you remain alert to any unusual or suspicious emails.
Please remember that U.S. Bank will never request information such as your personal ID, password, social security number, PIN or account number via email. For your safety, never share this or similar information in response to an email request at any time.
Stay alert to anyone who requests personal information via email. It just isn’t done by any financial institution.
What the heck is a “complex compound passphrase,” you ask? Ah, let me enlighten you, Grasshopper! I am the master of password systems, but this one escaped me. You see, I had fallen into the trap known as complexity and had been busy defining complex algorithms for generating unguessable passwords; in essence, I had been hoist by my own petard.
Yesterday, while solving the latest Cryptoquip puzzle in my local newspaper, I had a revelation. The description of the cryptoquip always says something along the line of “this puzzle is a simple substitution cipher…” The Aha! moment came when I realized that “simple” is the operative word here. People don’t like complexity, so the average person isn’t going to use a complex algorithm.
So, even though I call this “Complex Compound Pass Phrases,” the method of creating them is simple. I call them “complex” because they are extremely strong and nearly unbreakable for all intents and purposes. Here’s how to create them.
- Choose at least two words that are memorable to you. It doesn’t even matter if it’s something someone else would know. Use your pet’s name, your mother’s name, whatever.
- Merge the two (or more) together alternating letters from each word, creating a string.
- To make it all even more secure, capitalize every other letter or change a couple of the letters to their number equivalents.
All that would take a minute, at most and is easily remembered.
Here’s an example using my name and my pet’s name (Kenneth, Missy): KmEiNsNsEyTh. You could change the E’s to 3’s and you would have Km3iNsNs3yTh.
Pretty well unguessable!
Note to hackerz: I have not and never will use that pass phrase, so don’t bother trying to hack me! LOL
Saw this in a security forum today:
Here’s a new one; how about keylogging software pre-installed on brand new laptops, straight from the factory…….BY THE MANUFACTURER!!
The “StarLogger” software was discovered by Mohamed Hassan, founder of NetSec Consulting, after he scanned 2 brand new Samsung laptops [model numbers R525 and 540].
StarLogger auto starts with Windows and records all keystrokes made on the computer. It can be difficult to detect, and can be set to periodically and surreptitiously send e-mails containing information gleaned from the computer to a preset e-mail address, with screen capture images attached.
When Hassan first contacted Samsung to report this intrusion they referred him to Microsoft, saying all they did was manufacture the hardware. However, a senior supervisor at Samsung finally admitted that they had indeed installed the software on the laptops in order to monitor machine performance “and to find out how it is being used.”
In other words, Samsung wanted to gather usage data without obtaining consent from laptop owners.
Sounds as though users should be adding one more essential security step to the conventional strategy…..i.e. thoroughly scan any brand new machine as soon as possible!!
Or do you do that already??
Say it ain’t so, Joe (it’s opening day in Cincinnati).
It ain’t so!
Relax, will ya?