Dollar Ziddu

Translate

Kurs Mata Uang

Rabu, 28 Maret 2012

Fake Antivirus, "Cyber ​​Thugs" who Longevity




KOMPAS.com - One of the security threats on the internet is a fake antivirus program.This malicious program is quite long and many kinds.
Adi Saputra, Vaksincom antivirus analyst, explained that the fake antivirus program is the Holy Grail of Internet threats continue to persist for longer periods of time.
Since 2008, he said, there are over 300 kinds of fake antivirus. "If each one has 10 variants, then there are more than 3,000 rogue antivirus that actively spread on the internet," he wrote in a statement received Kompas.com.
One that attracts attention is Trojan.FakeAV.MJR Vaksincom that Adi was not detected by antivirus programs at the beginning of its emergence at the end of March 2012.
Trojan.FakeAV.MJR use the name Windows Software Saver to trick users. He seemed to be a useful software, but keep the danger behind him.
The program is spread via email in the form of a link to the web address (URL) specified. If the address is opened, the user will be prompted to download the malicious program.
The link will show a glimpse of a site similar to Windows Explorer. It's just that, the appearance will be accompanied by warning of a virus infection on the user's computer.
Impact Trojan.FakeAV.MJR
Victims are fooled into downloading fake anti-virus file will have the following points:Shortcut and the icon appears on the desktop as well as fake antivirus Start Menu.If executed, it would appear that the program looks like a regular antivirus program.Also appear in the Taskbar notification to trick users by saying there are a variety of viruses in the computer.Displays the window as if an antivirus program is scanning (virus scan).Displaying a false message that the firewall of the program that has blocked the entry of the virus and prevent evil.Antispam program led to information that had been blocking the flow of spam into the email user.Displaying false information that the Link Checker of the program had prevented a link that is illegal.Switch the application to open the Task Manager application that gave rise to the task manager menuSwitch the Regedit application to open an application that gave rise to the startup menuTransferred all functions of Windows applications and all applications that do not run SecurityTurn off the UAC (User Account Control) in WindowsConnecting to a Remote Server to download other malicious programs.Provide information to make a payment online to activate the trial version of the program is still
Adi asked that users be cautious in the face of an existing link in the email, even if the sender of the message are known.
To clean infected computers that have terlanjut Trojan.FakeAV.MJR earlier, Adi recommend users to use Boot CD G Data can be downloaded via Indowebster.

source : tekno.kompas.com

0 komentar:

Posting Komentar