Thursday, September 25, 2014

7 Ways to Keep the Dangerous Trojan Virus Off Your Computer


by Albert Bustos

As an efficient clinician, the last thing you need are major interruptions. Sure, there are inevitable “quick fix” circumstances that stray you from tasks at hand, but you can deal with that. What you cannot afford is a crippling computer virus that stops your productivity to a grinding halt.  

Enter Trojan, or Trojan Horse -- a malicious computer program that performs actions without your consent or knowledge. These actions can consist of automatically deleting, blocking, modifying and copying data, spreading additional malicious programs and launching an attack on other computers. A Trojan infection is catastrophic to your workflow because it offers multiple ways of damaging your computer. 

How do they get in and how can you protect yourself? 

Trojans commonly infect your machine through email attachments and internet downloads. Once a program containing a Trojan is ran, your system is infected. Trojans disguise themselves as harmless programs, but can severely immobilize your system depending on its type. 

Trojan horses assist hackers by turning your computer into a “zombie.” It gives them access to your credit cards, lets them install more malware and capture your key strokes. It is also possible for other hackers to control your computer simply by searching for computers already infected with a Trojan horse.

This is the paragraph I would normally insert a quick “virus symptoms” rundown, but I’ll refrain because I’d rather be thorough. Various Trojan Horses serve different purposes, so for a detailed list of types and actions, check out the list after the tips.   

Protect Yourself
Trojans cannot infect without a form of user interaction so education is key to prevention. Fortunately, as with other computer viruses, there are ways you can prevent an infection. Here are seven rational and technical tips to make sure Trojans remain unwelcomed. 

Tip #1
If you’re at work, do not download non-work related programs. Hackers will disguise Trojans as harmless programs for you to download. The second you open the program your computer is infected.  If you do need to download a program, contact your IT department for assistance.    

Tip #2
Install a good firewall to protect your Internet connection.

Tip #3
Install a good anti-virus program and update its database on a regular basis.

Tip #4
Protect your browser with security add-ons like HTTPS everywhere, NoScript, and Web of Trust (WOT).

Tip #5
Download files and applications from trusted sources and scan executable files using your anti-virus programs

Tip #6
Read your email in plain text mode, if possible to prevent a Trojan from sneaking into your system from a loaded image and/or video

Tip #7
Recognize suspicious emails from unknown sources. Most likely, Brad didn’t see your profile and wants you to “click here” to respond. And, I think it’s doubtful someone a gazillion miles away wants to transfer $8 million to your account; you probably don’t need the details.


Virus Trojan Types and their Purpose

Backdoor
A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching, and deleting files, displaying data, and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.

Exploit
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.

Rootkit
Rootkits are designed to conceal certain objects or activities in your system. Often, their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.

Trojan-Banker
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.

Trojan-DDoS
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address…leading to a denial of service.

Trojan-Downloader
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and
adware.

Trojan-Dropper
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.

Trojan-FakeAV
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats…even though the threats that they report are actually non-existent.

Trojan-IM
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.

Trojan-Ransom
This type of Trojan can modify data on your computer so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.

Trojan-SMS
These programs can cost you money by sending text messages from your mobile device to premium rate phone numbers.

Trojan-Spy
Trojan-Spy programs can spy on how you’re using your computer. For example, tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.

Trojan-Mailfinder
These programs can harvest email addresses from your computer.


Read this far? Great. Share it with others and help them be Trojan virus free! 

No comments:

Post a Comment

Past News