Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Sources of Malicious Software Show Some Change

The growing importance of the Internet to everyday life creates an ever-larger target for cyber criminals.  Internet security against cyber crime is vital for businesses and individuals alike.  Malicious software corrupts systems, destroys data, and allows the theft of identities or banking information.  Hackers looking to make a quick buck by exploiting weak Internet security are nothing new.  A recently released report about malicious software and where it is housed online brings the issue into sharper focus.

The report broke down where malicious software entered a user’s system.  For many years, pornography sites and email were the two biggest holes in Internet security.  A report in 2010 stated that 37% of Internet content was pornography.  Malicious software embedded in images and streaming video are easy traps for unsuspecting browsers.  Email scams have existed as long as the Internet.  Many have dealt with problems that necessitated virus removal after opening an attachment better left alone.  The surprise came with these sources of malicious software listed third and fourth. 

The largest source found in the report was search engine results and portals.  Malicious software networks are adept at creating fraudulent websites, as the report captured statistically.  Shnakule, a malicious software delivery network, hosts thousands of unique domain names.  The enormous vehicle for malicious software featured over 2,000 unique host names per day, spiking upwards of 4,000 at times through the first half of 2011.  The constantly shifting host names make Internet security against this type of coordinated activity difficult.  This system of seemingly legitimate web addresses helped attract an average of 21,000 requests per day through various misleading activity.

Fake programs, updates, pirated material, and codecs were among the material used to draw in unsuspecting victims.  Networks such as these seed links to malicious software under false pretenses.  That torrent file supposedly holding the latest album or movie you do not want to pay for may be disguised malicious software, waiting to wreak havoc on any user mistakenly allowing entry through Internet security.  Search engine results are sprinkled with web sites specifically created to seem genuine while housing malicious software within downloads offered.   Internet security against this threat is important for your system.

Protecting your system or network with adequate Internet security is necessary for safe web browsing.  Hackers and creators of malicious software continue finding better ways to infiltrate the expanding World Wide Web.  Make sure your Internet security features updated virus protection.  A firewall can help make this protection stronger.  People are not going to stop trying to exploit the power of the Internet.  Taking the time to educate and protect yourself, helps ensure that your next search is not for computer support to help remove some malicious software that just snuck through your Internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com

Leave a Reply

© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending