Malware Prevention
Total Page:16
File Type:pdf, Size:1020Kb
MALWARE PREVENTION This section of the Malware Help web portal describes how we can prevent Malware from infecting our PC. You can either jump right in, and read the section from beginning to end, or select what interests you most. As a minimum, we suggest reading the outline introduction to Malware and how to protect your PC. Make a selection from the following: ● HowHow doesdoes mymy PCPC getget MalwareMalware? ● WhatWhat cancan II dodo toto preventprevent gettinggetting MalwareMalware? ● HowHow dodo II configureconfigure WindowsWindows toto helphelp meme? ● WhatWhat toolstools areare avaliableavaliable toto avoidavoid MalwareMalware? How does my PC get Malware? Since Malware is distributed as some form of executable software code, it must be introduced to the computer in some manner. Today there are several ways that Malware may be introduced into your computer, such as: ● FROM EMAIL - Opening a Malware program disguised as an Email attachment. For more tips on how to keep email safe, see: link; ● FROM A WEBSITE - Downloading files from the internet, to which a Malware program is attached; ● FROM A POP-UP WINDOW ADVERTISEMENT: Loading programs/software recommended by advertisers to which Malware “trojans” are attached. For more detail on what do do if you get a pop-up window that requests you to click somewhere: link ● FROM ANOTHER PIECE OF SOFTWARE: Installing new software or updating software already on the computer with software, to which a Malware program is attached; ● EXTERNAL MEDIA - Using infected flash drives, USB drives, or VDD/CD's (like the old floppy disk method); ● SOCIAL MALWARE - Allowing third parties, usually from a convincing telephone caller, to control the computer remotely through the internet. In most cases some form of deceit is involved and the innocent user is unaware of the danger or possibility. An example would be the telephone caller from “Microsoft” or “Windows” to help rid your computer of viruses. Or the email from Paypal or your bank which informs you that your account has been compromised, and that you should “click here”. HOME What can I do to prevent getting Malware? In terms of Malware prevention you are the first line of defense, and whether you believe it or not, are the cause of any intrusion. So, here are a few “operating practices” that will help limit any damage caused by Malware: ● ALWAYS KEEP SOFTWARE UPDATED – particularly the Operating System software (e.g. Windows 7 or Windows 8.1). Here's how to do that: link ● SLOW DOWN AND READ THE SMALL PRINT – read before you click and be sure you are aware of where the click will take you. Remember, “If it sounds too good to be true, then it is”! ● ONLY DOWNLOAD SOFTWARE THAT YOU NEED – usually, the more actively a product is promoted, the more likely it is to be damaging. ● NEVER INSTALL SOFTWARE FROM AN UNKNOWN SOURCE – preferably use only secure websites, and preferably only those endorsed by Microsoft. Avoid third party downloading websites unless you are sure they are trustworty. At this time, www.ninite.com is a good downloading website for Windows software. See how to know whether a website is secure:link ● KEEP COMMON UTILITIES UPDATED – most Browsers use plugins to assist with media content of websites. For Example Adobe Flash and Java are often used as plug-ins to Browsers. These plugins need to be kept updated. Here's more about Java and Flash: link ● USE RANDOM, COMPLEX PASSWORDS, and change them regularly. Here's some password tips link HOME How do I configure Windows to help me? Depending on which operating system (OS) you use (Windows 7, Windows 8.1, even XP and Vista), you can configure Windows to minimize inadvertent entry of Malware: ● Permissions – all operating systems use some form of User Account to separate different users. Account Permissions allows two types of accounts - “Standard” and “Admin”. Often, when you are the only user of a particular PC, initial set up will probably include one or at most two accounts – a “Guest” account and a “Named” account (your name usually) which are assigned “standard” and “admin” permission respectively. A good practice is to have TWO named accounts – a day to day use account with “standard” permission and an “admin” account for use only when “admin” permission is needed. This way if there is a security breach, the associated Malware will most likely only have “standard” account permission and therefore damage will be limited. How to manage users in Windows 7/8/8.1: link ● User Account Control – UAC defines what types of download operations will be allowed without authorization. There are four levels, with Level 2 providing a reasonable level of protection. How to set UAC in Windows 7/8/8.1: link ● “Autorun” – this secures any external devices such as DVD players and USB ports and avoids them automatically running (and installing Malware). You can do this by following Microsoft's procedures, which differ by operating system and are described in Microsoft Knowledge Base articles 967715 and 967940 which are frequently referenced for this purpose. HOME What tools are available to avoid Malware? While not 100% guaranteed, Malware issues can be practically eliminated through use of the following simple “Barriers”: ● Firewall – software which when enabled, blocks unauthorized access through the computers internet interface hardware. Windows 7 and 8 both have built-in Firewall software, which should be always turned on. ● Anti-Virus – software that checks all data entering the computer, either through media or from the internet, to be sure it is free of known viruses. Again, Windows 7 and 8 have free Virus Detection Software available for download (Windows 7) or within the installed Operating System (Windows 8), which should be enabled. ● Spyware Prevention – software which blocks entry of “cookies” and other programs which run in the background to either report operating practices, or look for critical data. For example, Malwarebytes (download from www.ninite.com) operating in real time will provide some Spyware protection. Follow link for more information related to Firewalls, Anti-Virus and Spyware Prevention tools: link ● Security Tools – tools which when installed will assist and prevent inadvertent entry of Malware. For example browser add-ons designed to assist with safe internet browsing, etc. Follow link for more information related to security tools; link ● Software Maintenance – use of various tools and scans in a preventative manner. Using various Malware scans are covered in more detail in the Malware Removal section. However, in addition to preventative scans, we need to be sure all critical software is updated, and that we have critical data backed up. Follow link for more information related to Updates and Backup: link HOME How to avoid Malware while using Email Webmail vs. Email program? The difference between accessing Email via the internet (e.g.mail.google.com) vs. an Email program on your computer (e.g. Windows Live Mail, Thunderbird, etc.), is that with an Email program you a viewing a copy of your mailbox whereas with Webmail, you are directly accessing your mailbox. Using a program is inherently safer, since you can recover mistakes easier, and minimize data traffic over the internet (which is more susceptible to Malware intrusion). See following for directions to install Windows Live Mail – link. Windows Live Mail is installed as part of Windows Essentials, a free Microsoft download. When installing, be sure to only select Live Mail, and deselect the other add-ins; you do not need these other programs associated with Windows Essentials. Thunderbird is available from www.ninite.com Email attachments – One of the oldest ways to spread malware is through email attachments ● Do not open attachments from people you do not know ● If a friend sends you an attachment that looks suspicious contact them first before opening the attachment ● Never open emails that end in .exe, .bat, .com, .vbs Phishing Emails – Phishing emails will try to convince users into clicking on a link within the email. The link will take the user to a website that will either try to make the user manually install malware or will perform a “drive-by” download to install the malware. ● Never click on links in an email ● Find out how to protect yourself from Phishing Emails - link BACK How to avoid Malware from pop-up Windows What is a pop-up Window? Popup alerts falsely tell the user that their machine is infected with a virus or has some other problem that needs to be fixed such as Driver Updates. The user is asked to click on the alert to install the software (really Malware in disguise) that is purported to fix the problem or a “drive-by” download will be initiated. What to do and what not to do: ● Do not click or engage with the popup window. In the example to the right, you would not click on the “Pause” or “Stop” buttons. ● Do not close window or Browser normally ● Open Task Manager - Win7 – CNTL-Alt-Delete Win8/8.1 – select Windows Icon (bottom left corner), Right Click and sect Task Manager from menu ● Look for Browser under Application tab, select and close application BACK Firewall, virus detection, and anti- spyware software Depending on which operating system (OS) you use (Windows 7, Windows 8.1, even XP and Vista), these tools are available within the OS or are from third parties. ● Virus Detection Software – Microsoft Security Essentials (MSE - Windows 7) and Windows Defender (Windows 8.1) are free and do not come with other bundled software and ads. Windows 7 – download Microsoft Security Essentials from www.ninite.com Windows 8.1 – comes with Windows Defender ● Firewall – MSE and Windows Defender both come with a built in Firewall which should be kept activated.