Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


BEST PRACTICES: PC World's Avoid viruses & Scams

  • Please log in to reply
6 replies to this topic

#1 harrywaldron


    Security Reporter

  • Members
  • 509 posts
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:02:57 PM

Posted 26 June 2004 - 06:32 AM

The August 2004 issue of PC World magazine has one of the best security awareness articles I've seen recently. We can avoid viruses and worms by "thinking before we take action" (e.g., think before you click). We should not rely on firewalls and antivirus software to always catch these threats as new ones surface each day. One approach I use is to think of each email as being dangerous, even if it's from someone you know or appears to be official business or ISP correspondence.

Article: Think Before You Click to Avoid Viruses and Scams


1. Don't click e-mail attachments: Most viruses and worms arrive on your PC in the form of e-mail attachments. A few of them exploit security flaws in Windows or in your browser to launch automatically, but if you keep your programs updated, your chances of being infected via this route are slim to none. Instead of exploiting software flaws, some of the worst recent viruses rely on recipients' tossing out common sense and launching a lethal e-mail attachment. Common executable--and therefore dangerous--file-name extensions include .bat, .com, .exe, .pif, .scr, and .vbs (to read a discussion of dangerous file types, go to February's Windows Tips column). To elude the dangerous-attachment filters built into most e-mail programs, virus authors may enclose their nasty code in a .zip or .rar archive file.

2 .Don't believe the return address: Though an e-mail message may claim it's from your bank, your ISP, or even your boss, that doesn't mean it is. Spammers and virus mailers generally spoof the From address field in their messages with a legitimate address that they've stolen. You may even have received spam from yourself as a result of this clever technique.

3. Don't believe the message: To persuade you to launch a virus-laden mail attachment or provide your personal information, virus authors must earn your trust. They try to accomplish this by composing convincing-looking messages that appear to be sent from Microsoft, your ISP, or some other entity you do business with. The message may even contain links to a counterfeit version of the company's Web site, complete with genuine-looking graphics and corporate logos. Often the message laments that the company is experiencing technical problems, and that it needs you to click an executable attachment. You don't need to rely on your intuition to determine whether this message is truthful. If the message hasn't been verified by a company representative via phone or in person, it almost certainly contains a virus. Microsoft doesn't e-mail updates to its customers, and neither should your ISP.

4. Don't believe the link, either: A link in an e-mail message that claims to point to a Citibank Web site may not really go there. Devious phishing scams use the wonders of HTML to snooker you into uploading your Social Security number, PIN, credit card number, password, or other sensitive data to a scammer's Web site. A carefully crafted e-mail message purporting to be from your bank, PayPal, or some other institution (and often also containing links to the real company's Web site) warns that you must update your records there. The biggest tip-off should be this: Banks and ISPs don't lose your information and then send e-mail requests for you to reenter it online. Another tip-off is that the link text and the real underlying URL don't match. Always examine log-in Web pages and their URLs closely. If you do get hooked by creeps on a phishing expedition, notify your bank, ISP, or other institution immediately.

5. Don't download the browser code: You're browsing the Web via Microsoft's Internet Explorer when suddenly an official-looking dialog box pops up, asking if you want to download a browser plug-in. Why not? You do the same thing all the time when using Microsoft's Windows Update Web site. This one even has a digital certificate (see FIGURE 3). But if you want to avoid a flurry of pop-ups, undesirable toolbars, a home-page hijacking, or worse, don't do it. Certificates won't protect you from adware and other online annoyances borne by these ActiveX controls. If you're really unlucky, you could end up with the dreaded CoolWebSearch infestation (see last month's Internet Tips column for tools that can remove this hard-to-exterminate browser parasite).

Edited by harrywaldron, 26 June 2004 - 06:34 AM.

BC AdBot (Login to Remove)


#2 jgweed


  • Members
  • 28,473 posts
  • Gender:Male
  • Location:Chicago, Il.
  • Local time:01:57 PM

Posted 28 June 2004 - 02:02 AM

This should be must reading for everyone. Thanks for posting it here.
Whereof one cannot speak, thereof one should be silent.

#3 Papakid


    Guru at being a Newbie

  • Malware Response Team
  • 6,664 posts
  • Gender:Male
  • Local time:12:57 PM

Posted 28 June 2004 - 12:30 PM

This should be must reading for everyone.

That's why I pinned it. Great post (as usual), Harry.

We encourage posting to this thread any additional best practices for security.

We always did feel the same

We just started from a different point of view

Tangled up in blue--Bob Dylan

#4 Deodar


  • Members
  • 83 posts
  • Location:41'00"S174'.00"E
  • Local time:01:57 PM

Posted 08 April 2005 - 09:22 PM

:thumbsup: Hi guys,tutorials are great.One security issue;just tested firewall@Guards Up &
Port Authority-Kerio passed with flying colours BUT reportedly I'm being PINGED!
Is there any way to close this vulnerability??I don't like being PINGED-even tho I
ping to test modem/connectivity etc.Just installed TRACE ROUTE which is fun but
can't close that port.Hope this is relevant to this Forum.

#5 igonuts2


  • Members
  • 358 posts
  • Gender:Male
  • Location:my closet
  • Local time:10:57 AM

Posted 18 April 2005 - 10:21 PM

i added all .xxx into nortons "rules" for spam.


Why work when you can play!

#6 laling


  • Members
  • 4 posts
  • Local time:02:57 AM

Posted 27 November 2006 - 11:16 AM

That a key factor for security purpose..Very good advice
Now I'm set in my head "think twice before execute"

welldone harrywaldron

#7 hillbillygreek


  • Members
  • 397 posts
  • Location:SC
  • Local time:01:57 PM

Posted 27 November 2006 - 02:27 PM

It would be recommended to install an anti-phishing toolbar such as Netcraft , Sitehound etc.. to further protect someone from being directed or redirected to a fraudulent website & entering personal information such as passwords & email addresses that could wind up in the wrong hands.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users