Thursday, 16 September 2010

Spyware and Viruses: What's the Difference?

 

Spyware and viruses: What is the difference?

Spyware and viruses: What's the difference?
Spyware and viruses are both malicious software, but they're different. Learn how, and how Microsoft Security Essentials can help protect you from both. Then find answers to these common questions about Microsoft Security Essentials:

Suspect you have a virus? Get help fast at our new Virus and Security Solution Center, and learn steps that you can take to help remove it.


Security updates for September 14, 2010

The bulletin for September includes 9 security updates: 7 for the Windows operating system, 1 for Microsoft Office, and 1 for Microsoft Internet Information Services.


Microsoft security news

 

Fraud alert: "Your Hotmail account will be deleted"
A new scam email claiming to be from Microsoft asks for personal information to avoid suspension of your Windows Live Hotmail account. Do not reply! This email message is a scam.

 

Fraud alert: UPS package scam
In recent newsletters, we told you about a phishing email message purporting to be from UPS. A reader recently brought another UPS-related scam to our attention.

 

Worried about ID theft? You're not alone
A recent study by the National Cyber Security Alliance and the Anti-Phishing Working Group found Americans are as concerned about ID theft as they are of job loss.

 

Microsoft to lead Family Online Safety Institute
A group manager from Microsoft's Trustworthy Computing group recently assumed the chair of the Family Online Safety Institute (FOSI) board of directors. Learn more about FOSI and its charter to make the Internet safer for families.

 

Operation b49: Microsoft takes on the bots
In February, Microsoft helped take down the Waledac botnet in an effort known internally as "Operation b49." Now in phase two, Operation b49 can help you clean out your PC if you think it's been infected by a bot.


Protect your computerProtect your computer

More ways that spammers can get your email address
In last month's newsletter, we told you about four ways that spammers can get your email address. Here are more great tips from our readers.

Is pirated software putting you at risk?
If a deal for software seems too good to be true, it probably is. See how to check for a Certificate of Authenticity label to ensure that you have genuine Microsoft software.

Watch videos on online safety
If you prefer to learn by watching rather than reading, take a look at our new how-to videos on computer security, privacy, and Internet safety.


Protect yourself and your familyProtect yourself and your family

Free ebook for online teens
Help teens protect themselves online with a free, downloadable ebook from Microsoft that covers topics including cyberbullying, social networking, hackers, and more.

5 steps to help keep your passwords secret
These five guidelines will help you protect yourself when you log on to your computer or any site where you enter personal or financial information.

Donate to Pakistan flood victims safely
If you want to donate to flood relief efforts in Pakistan, make sure you do so safely. Here are tips to avoid donation scams, plus links to legitimate relief organizations.


Security resources


About this newsletter
Microsoft Security for Home Computer Users is a monthly newsletter bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive more technical security information, see the Microsoft Security Newsletter.

© 2010 Microsoft Corporation Terms of Use | Trademarks

Microsoft

Sunday, 12 September 2010

Consumer Threat Alert: New "Here You Have" Worm Delivers Unwanted Gift

 

 

McAfee®

Share this on:

 

Consumer Threat Alerts

 

 

New "Here You Have" Worm Delivers Unwanted Gift

Global mass mailing worm masquerades as business message
but links to malware, McAfee Labs warns

A new Internet worm dubbed "Here You Have" is streaming into worldwide inboxes, offering a dangerous payload, according to McAfee Labs. The worm, which travels via spam email with the subject line of "Here you have," or "Just for you," masquerades as an email with a link to a video or an attached document file. However, the email actually contains a link to a malicious program that can disable security software and send itself to all the contacts in the recipient's address book.

Corporations around the world were particularly affected by the worm on Thursday as it clogged up their email systems. Consumers could be affected as they go home and log onto their machines. For this reason, McAfee Labs has labeled the worm as a "medium" risk, and warns all computer users to delete any email with the "Here you have," or "Just for you," subject line.

Although the dangerous link has been taken down, neutralizing the threat, it can still spread through remote machines, mapped drives and removable media, Labs warns.

If you have an up-to-date and properly configured McAfee security software product then you are protected against this threat.

The Hook: You receive a spam email with the subject line "Here you have," or "Just for you," and a link or attachment that looks like it leads to a video or document file. It may appear that the email comes from someone you know.

The Methods: The email invites you to click on the link, and once you do it prompts you to download a file. This file is actually malware that disables the security software on your machine and sends itself to everyone listed as a contact in your address book.

The Dangers: Once you are infected, your computer has diminished security protection. Your machine is also being used to spam your friends and contacts. If you are on a corporate network, the network could be clogged as the worm works its way through address books.

Bottom Line: Do not click on the link in any email with the subject header "Here you have," or "Just for you," even if it appears to be from someone you know.

Tips to Avoid Becoming a Victim:

1.     Never click on a link in a spam email or IM from someone you don't know. Be suspicious of strange emails from family or friends: their accounts may have been compromised.

2.     Use comprehensive security software, like McAfee Total Protection software, to protect you from viruses, spam, and other Internet threats, and keep the software up-to-date. Save on McAfee Total Protection or try it free for 30 days.

3.     Set your operating system and browser to automatically apply updates.

 

 

Tuesday, 25 May 2010

Microsoft Security Articles

Security  Articles

Microsoft Malware Protection Center  
Website | RSS Feed
MSRT May Threat Reports and Alureon  - 22-May-2010
MSRT May Threat Reports and Alureon   - 22-May-2010

Microsoft Security Response Center MSRC  
Website | RSS Feed
Security Advisory 2028859 Released  - 18-May-2010

MSRC Ecosystem Strategy  
Website | RSS Feed
Strengthening the Security Cooperation Program  - 17-May-2010
Project Omega Launch at AusCERT  - 17-May-2010

Security Bulletins Advisories  
Website | RSS Feed
Microsoft Security Advisory (2028859): Vulnerability in Canonical Display Driver Could Allow Remote Code Execution - 5/18/2010  - 18-May-2010

Security Bulletins Comprehensive  
Website | RSS Feed
Microsoft Security Bulletin Summary for May 2010  - 19-May-2010
MS10-030 - Critical: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542) - Version:1.2  - 19-May-2010
MS10-031 - Critical: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (978213) - Version:1.1  - 19-May-2010


Security Products Forefront  

Forefront Client Security  
Website | RSS Feed
Pardon our dust….  - 17-May-2010
Pardon our dust….  - 17-May-2010

Forefront Product Suite  
Website | RSS Feed
Issuing information cards with AD FS 2.0: Community Technology Review released  - 21-May-2010

Forefront Server Security  
Website | RSS Feed
Introducing the Forefront Protection 2010 for Exchange Server capacity planning tool  - 21-May-2010
Check out this new video overview of Forefront Protection 2010 for SharePoint  - 20-May-2010

Forefront Threat Management Gateway ISA Server  
Website | RSS Feed
Announcing the availability of the new MRS (V1.1) release  - 18-May-2010

Forefront Unified Application Gateway UAG  
Website | RSS Feed
DirectAccess and Teredo Adapter Behavior  - 21-May-2010
UAG DirectAccess Test Lab Guide CRL Check Update  - 20-May-2010
Introduction to “The Edge Man”  - 18-May-2010
Configuring an External Load Balanced UAG DirectAccess Array for an IPv4 Only Network  - 17-May-2010

Wednesday, 12 May 2010

No-Cost Antivirus and Antispyware Tools from Microsoft

Get no-cost antivirus, antispyware, and other security tools

Get no-cost antivirus,
antispyware, and other security tools

Concerned about your computer becoming infected with a virus, spyware, or other malicious software? Who isn't? One quick, easy way that you can help protect your PC is by downloading Microsoft Security Essentials. It provides real-time protection against malicious software, and it's easy to install, simple to use, and free. Learn more about Microsoft Security Essentials, plus discover other free security tools from Microsoft for additional protection.


Security updates for May 11, 2010
The bulletin for May includes two security updates: one for the Windows operating system and one for Microsoft Visual Basic.


Microsoft security news

Support for Windows XP with Service Pack 2 ends July 13, 2010
Support is ending for some versions of Windows. Learn how to determine which version and service pack you're running, and what end of support means for you.

Microsoft releases new Security Intelligence Report
Get Microsoft's latest analysis of the leading security threats to your PC. Download Security Intelligence Report Volume 8 or see a summary of key findings.

"Rethinking the Cyber Threat"
Microsoft Corporate Vice President of Trustworthy Computing Scott Charney outlines a framework for creating more effective cyberattack responses. Read Charney's message or download the full paper.


Protect your computerProtect your computer

Get virus help from a local security expert
If you think your computer is infected with a virus or spyware, you can call Microsoft support or even find a local computer expert to help you. Here's how.

See if your Windows operating system has protection built in
There are four basic steps to help protect your computer. Check to see if your version of Windows has these features built in.


Protect yourself and your familyProtect yourself and your family

How to reduce your risk of online fraud
This article offers the basics on protecting yourself from identity theft online. Learn three common online scams, where you might see them, and six telltale signs of a scam. Plus, find advice on how to avoid scams and where to report possible fraud.

You've inherited money! Or not
We try to keep you alerted to the latest Internet scams. Last month it was the MSN Auto Protection scam and the UPS package delivery scam. This month it's the windfall inheritance scam.

Should I surf the web in Protected Mode?
To help protect against spyware, make sure that you surf the web in Protected Mode in Internet Explorer. Learn what Protected Mode does and how to ensure it's on.


Security resources


About this newsletter
Microsoft Security for Home Computer Users is a monthly newsletter bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive more technical security information, see the Microsoft Security Newsletter.

© 2010 Microsoft Corporation Terms of Use | Trademarks

Microsoft

Thursday, 22 April 2010

MVP Announce: Alert - McAfee Update Causing Windows XP Machines to Shut Down

What is the purpose of this alert?

Microsoft has been made aware of an issue with a McAfee DAT file update - released Wednesday, April 21, 2010 - that has been causing stability issues on Windows XP client systems. The symptom is caused by a false-positive detection on a core Windows file (svchost.exe). Once the file is quarantined by McAfee, the system may encounter one of the following symptoms:

·                                 The computer shuts down when a DCOM error or a RPC error occurs

·                                 The computer continues to run without network connectivity.

·                                 The computer triggers a Bugcheck (Blue Screen). 

The DAT file version that that caused the problem is McAfee DAT 5958. This file was propagated to client machines that conduct automatic updates of definition files. McAfee updated the DAT file soon after the problem was identified with a new version that does not cause the problem.

 

Resolution Steps

 

Please review the following KB Articles for specific steps to resolve the issue on systems that are affected.

 

McAfee KB Article:

 

Microsoft KB Article:

 

Recommendations

 

We recommend customers affected by this symptom first review the McAfee KB Article referenced above. For further assistance, customers should contact McAfee. Customers who are unable to resolve the issue through these means can contact Microsoft for technical support using resources found on this Web page: http://support.microsoft.com/.

 

Regarding Information Consistency

 

We strive to provide you with accurate information in static (this mail) and dynamic (Web-based) content. Microsoft’s security content posted to the Web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s Web-based security content, the information in Microsoft’s Web-based security content is authoritative.

 

 

 

 

Thursday, 25 February 2010

My Article in January 2010 Edition of the Hakin9 Magazine

One of my articles have been published in the January 2010 edition of the Hakin9 International IT Security Magazine. The articles title is The Fear Factor - Study of a new genre of malwares called "Scarewares" Edition Link: http://hakin9.org/magazine/995-hardware-keylogger-a-serious-threat