A virus is a program written to cause harm to the user via destruction or theft of data and possible damage to equipment. Viruses do not have a GUI and work in the background without showing obvious signs of its presence. No one wants to catch a virus on your computer or smartphone, so let's discuss how to understand that after a couple of days your device is located, the virus.
the habitats of virus
the infection of the device will not have to wait long if you walk side-by-side with the virus in the places of their greatest concentration.
Today in 99% of cases the infection occurs via the Internet. But not all Internet is the same, the greatest danger posed by the sites software is varezniki. When you search for download for Windows, the search engines do not always display at the top of the official website of the program. Unfortunately, crooks have mastered the skill of promotion in search engines Yandex and Google, the official website may not be on first position of search results.
Fraudulent sites usually contain the name of the program with other consoles and subdomains. Sites similar to normal, with a good description of the program and direct download link. Most likely, the program will even be working, but vdovesok on the computer will be installed with additional services and browsers, and maybe a virus. It is especially dangerous to run the installation file, if it takes up little space compared to expected. For example, the program must "weigh" at least 10-20MB, and the installer is on disk is only 1MB. The task of the installer to download the program and "something else".
, There are major varezniki aggregators, which you can download almost any program, each of which will be a surprise. But usually in this case the virus will not, but the sudden completion of labels unnecessary services in the start menu and on the Desktop is secured.
To filter dangerous sites need antivirus with Internet filter. Antivirus BitDefender on-the-fly analyses websites with potentially dangerous content and blocks the loading of the page therefore, experts often consider the program. BitDefender is able to completely block the website, instead of giving the page a warning to all the browser window. The website can be normal, but to load potentially malicious Java-scripts. In this case, the page appears but blocks the download of these scripts.
The most dangerous are websites from hacking paid software. They offer to download the software and crack file. "Crack" — this little program can be called "crack.exe", "keygen.exe" — to generate a valid serial number, or something. Hackers don't work for free, so there is some benefit. The benefits of sewn in Troyan-hacking software.
The difficulty here is that the crack can be clean, and maybe with a Trojan. It's hard to figure out, because anti-virus software almost always detects cracks as viruses. It's the job of the heuristic analyzers that can identify zero-day threats, i.e. yet unknown viruses. Cracks interfering with the executable files of third-party programs, and hence their behavioral pattern is potentially unsafe, similar to a virus. To more accurately determine the virus or not, run the file for 80 antivirus bases using the VirusTotal service.
E-mail and thumb drives
Another "tasty morsel" for cyber criminals is your e-mail. Boxes hammered dozens of emails with enticing themes:
- You came a money transfer!
- You win in a random event!
- You have received an inheritance from his African grandfather-millionaire!
- You sent the first bitcoin!
Any emails from unknown recipients with enticing content is a threat letter. In any case, you cannot click on links and open attachments, even pictures! Even if the addressee is known to you, you should know that there is no problem to send email to any recipient. For example, I can send you a letter with the address "email@example.com". For best protection, you need to install antivirus with phishing protection, such as, BitDefender Antivirus, the database of phishing websites which is continually updated.
If you mindlessly open all the letters with the hope to win a million or get an inheritance from Buffett, it is a fun evening you provided! And even better – to disable spam-filters or use mail filters. The best protection is provided by Gmail, Mail.ru Yandex.
The more the infection will accelerate chaotic peretekanie other flash drives that bring to the workplace. Without an antivirus with a scan of removable media-USB drive - it is just a storehouse of virus threats.
Software for virus protection
How fast and what kind of virus you catch, depends on your methods of protection. The most common:
- of it
- Sifrovani ransomware,
- the Spyware
Trojan is a malicious program running "bundled" with other software. Trojan can delete, block, modify, copy data to affect the operation of computer and network, as well as downloading other malware. Work antivirus most aimed at detecting Trojans.
Rootkits attack the kernel and system files, is able to cause maximum harm to the computer, working on a low system level. As a rule, all famous antivirus programs are able to detect rootkits.
Sifrovani become a big headache over the last few years. They encrypt the files on the hard drive and restart the computer, but instead of a greeting message is displayed on the entire screen with the extortion of ransom. Further operation of the computer impossible. A large redemption, equivalent to a 500-700$ please Bitcoin. Thanks to the rising popularity of cryptocurrency, the crypto is widespread. Cryptocurrency is anonymous and does not allow you to track the final recipient of funds.
should Not pay the requested amount, as no decryption key exists. In some cases the data be decrypted using special tools. Antivirus BitDefender oriented to the work with the ransomware, it detects attempts to encrypt and instantly blocks the operation, restoring from a backup of already encrypted files. The chances of infection are growing, if you don't use specialized software to protect against ransomware, it
Viruses spyware steal confidential information such as usernames and passwords, credit card numbers, private keys, work documents, personal correspondence, photos, and videos. Also, spies can turn on the webcam and microphone to monitor what is happening in the room. On smartphones spy can imperceptibly activate camera for hidden camera on Android.
To not catch a spy you need to use an anti-virus together with additional anti-spyware software. For example, AntiSpyware Blaster closes in browsers the ability to run scripts and spyware install tracking cookies. There is antivirus software working in real time, like a regular antivirus, but aimed at catching spyware.
For maximum protection against spyware it is recommended to use the operating system Windows 10. In the ten integrated functions of control of access rights to a web camera and microphone. Means of communication may use only those programs that have been explicitly granted rights.
Worms get on the computer by running infected programs. They climb through the network of holes, network vulnerabilities and open ports. Antivirus with protection function in real time, in principle, are caught trapped in the system of worms, but it will be an ongoing process. For proper protection, you need to enable the firewall built into Windows 7/8/10 or are part of antivirus. Firewall (firewall) closes vulnerable ports, monitor suspicious network activity and prevent unauthorized access attempts from the Internet. The firewall greatly reduces the chances of infection of network contagion.