• warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.
  • warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.
  • warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.
  • warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.
  • warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.
  • warning: preg_match() [function.preg-match]: Compilation failed: disallowed Unicode code point (>= 0xd800 && <= 0xdfff) at offset 1811 in /home/newgenco/domains/newgenco.vn/public_html/sites/all/modules/ctools/includes/cleanstring.inc on line 157.

6 measures to protect against malicious software

Mô tả: 
Last year saw the rise of malware network, the infrastructure to take advantage exploited popular places to constantly put out the attacks of malicious software major. Blue Coat Labs has launched six best practices can help organizations protect themselves from this threat.

Last year saw the rise of malware network, the infrastructure to take advantage exploited popular places to constantly put out the attacks of malicious software major. Blue Coat Labs has launched six best practices can help organizations protect themselves from this threat.

In 2011, the cyber criminals to continue the game by creating the malware network - the network infrastructure that utilizes exploited popular places on the internet as the search engine or social networks to generate continuous series of attacks of malicious software.
Security company Blue Coat Sytems began tracking the malware network over the past year. In the 2012 report of the security company.

 

Blue Coat emphasized that the network infrastructure to allow malicious cybercriminals launched a series of explosive attacks that antivirus solutions normally undetectable for several days or even months . The report shows that a malware has changed locations more than 1.5000 times / day in February 2012.
Mr. Sasi Murthy, senior director of product marketing for Blue Coat CIO.com said they have checked about 500 malware network, but only some very small networks, but some others will take global nature. Many networks do not work for many years and it is an elusive laws effectively.
According to Blue Coat, network malware is Shnakule largest. It is exploited in North America, South America, Europe and Asia. All activities are conducted through its views on the accident, AV fake codecs, Flash and Firefox updates, the CNC control, gambling ... In July last, the network also extends advertising activities to both harmful.
The malicious network activity like
The malicious network is a collection of several thousand domain, a separate server or website is designed to work together to trick the victim downloads the malicious software - often using the reliable as a starting point first. Blue Coat said that the criminals can quickly roll out new attack attracted a lot of potential victims before the security policy can identify and block them.
Murthy said: "There are plenty of legitimate sites are actually infected. In some cases, you visit a legitimate website with nearly 70% of malicious content. "
Perhaps the most common way to trick the naive user is malicious search engine (SEP). These tools use a search technique optimization (SEO) to bring toxic sites in the regular search results.
Murthy said: "In 2011, about one in 142 searches or that lead to the malicious link. When you realize the query of how important all of us, that's when the most feared. "
Blue Coat said, each attack using other reliable websites to trick users. Some attacks do not even use the relay server. Once the bait used, they will be sent immediately to the server can determine the user's system or application vulnerabilities and using that information to download a malicious software.
Although the tools / search portals, and email remains the top target of cyber criminals, but in 2011 the social networking sites are increasingly fall into the range. Blue Coat, said the operator malicious network strategy to follow a low investment cost but highly effective, and portals / search engines and social networking sites has brought them a lot of potential victims. But that's not all victims. The network operators like hiding the malicious request their toxic load in the images clear and pages stored online and download sites are particularly concerned because the file is stored part of their business model. Blue Coat, said in 2011, 74% of all new ranking of online storage is toxic.
The best method of protection
Concerning the nature of the threat, the information technology organization must do to protect themselves and employees? Blue coat made sixth best suggestion as follows:
1 . Be aware and check your work often. The review of the traffic on your network can help you identify the abnormal behavior. If you see more clearly not flow from a computer on your network, it can be a sign that you have a problem.
2 . Lock all the contents from unreliable anonymous domain. If the content is not defined are intending to download the more likely it is toxic.
3. Give the policies surrounding the list of dangerous and potentially dangerous. When you suspect that a number of lists, either lock them or at least prevent the possibility. The category that includes high risk gambling sites, site hack, the porn domain and block proxy sites. The list of threats including downloadable software, the open-content / mixed, the online storage, web ads, the contents can not be viewed or the DNS domain function.
4. Lock all exchanges tend not to use SSL port 443. Blue Coat said that many programs use a custom encryption through port 443 to avoid being detected when the control servers. Individual organizations can enhance prevention by the use of a proxy device provides the ability to detect the SSL over port 443 and by blocking all these exchanges not want to use SSL port.
5. The class separating virus solutions at the desktop and gateway. By deploying multiple anti-virus tools throughout the system, you can increase the likelihood of a malicious software is a tool to ignore blocked by another tool.
6. Using applications and granular control to operate outside of web technology selected to minimize the risks of social networking. Murthy pointed out that the social network has expanded to become the "Internet in the internet" is almost a solution environment in which users can do things they would do in the wider Internet world. Therefore, businesses need to analyze and control the details outside of the site x ã opportunity to stand including personal web application and content of those sites.

Thứ tự sắp xếp: 
10
Tỉ giá ngoại tệ
Nguồn: Vietcombank

Hanoi

NewYork

Shanghai

Tokyo

London

Berlin