Internet Explorer Malware Hole

Microsoft announced this weekend that ALL versions of Internet Explorer were at risk for “drive-by” attacks from malicious websites. These attacks are currently happening around the world so this isn’t a “could happen” attack, it’s real.

 

A possible “drive-by” attack is one where you visit a website and you start getting pop-ups stating you have hundreds of viruses, trojans, bugs, etc. and offering to fix your computer problems, for a price. Another type is the kind where you don’t know that it’s happening but the malicious site is installing damaging software onto your computer.

 

The risk of the Internet Explorer issue is that is has the potential of allowing the hackers the same user access as you have on your computer. That means that they’d have the ability to install software, create new user accounts, change or delete your files, hold your computer hostage, and many more things.

 

Microsoft is working on closing these holes but it could be sometime for it happen. Microsoft has said that they will not fix the holes for Windows XP.

 

What are your options until then?

  • Stop using Internet Explorer. Download Google Chrome or Mozilla Firefox and set them up to be your default browser, especially if you’re still running Windows XP
  • Do not click on links that you get in emails, unless you’re absolutely certain they’re legitimate.  

Of course, if you’re already using a different browser, you don’t have to do anything further.

Is This Email from a Friend Safe to Open?

With all of the spam email being delivered, here are a few tips that will help you decide if the email you’ve just received are spam.

The To: field has email addresses in it that are obviously fake (you may be bcc’d on it)
The To: field has multiple email addresses in it that are in alphabetical order, many of which you have no clue who they belong to.
—————————————-
Look at the time of day the email was sent. If it was sent at 2:00 in the morning and you know the person in the From: field most likely wasn’t up at that time, question it.
If the time sent on the email is several hours later than the time at your location, chances are it was sent from a server out of country. Question it.
—————————————-
The attachments are either a .ZIP file or a .EXE file. There are legitimate reasons for someone to send a ZIP file but very few people do that any more. Always question it.
—————————————-
There is a link in the body of the email and the text in the email is asking you to click that link to “verify” some information. TIP – Hover your mouse cursor over the link without clicking. Most of the time a text balloon opens showing the actual site the link will take you to. Compare it to what the link in the email is. If it’s different, even a little bit, don’t click. If you’re suspicious, don’t click.
If something needs to be verified, don’t do it by clicking on a link. Open your browser and go the website itself and login and verify information. Most companies won’t ask you to verify anything via email. They may notify you and then tell you to login to your account but won’t have you click a link.

—————————————–

If you want to check to see if the email you received with an attachment is a virus, forward it to virustotal.

The sending process is as follows:

Create a new message, or forward the suspicious email to scan@virustotal.com as the destination address.
Attach the file to be scanned. Such file must not exceed 32MB in size. If the attached file is larger, the system will reject it automatically.

If you completed these steps correctly, you will receive an email with the file scan report. The response time will vary depending on the load of the system at the moment in which the file was sent.

—————————————-

Don’t reply back to sender asking if it’s okay to open the email. Chances are it didn’t come from who is in the From: field. Don’t reply back asking the sender to stop sending you things. If there is an “unsubscribe” link at the bottom of the email, don’t. All of these things tell the spammer that they’ve reached a live email address and you’ll be put on more spam lists and receive more spam.
—————————————-
Don’t EVER just click or open without questioning. Even if you’re expecting an email with an attachment, take your time to look at the email first for clues.

News Overload? Have You Heard of Flipboard?

By nature, I don’t watch the news. Often times it’s filled with nothing but bad news and then when I finally hear something I’m interested in, I never really get enough information since the newscasters are limited on length of talk. So, I just don’t watch the news.

With everything that’s going on in the world, from government, to business, to technology, to sports, how do I keep current on things? There are thousands of magazines, newspapers, web articles, but it would take me forever to read those. That’s not going to happen. What I do, is I open the Flipboard app my phone or tablet, and I flip through my personal magazines. (To install it, look for Flipboard in your devices app store. It’s compatible with Apple and Android devices)

Flipboard pulls together articles from magazines, blogs, social media sites and other places, categorizes them into sections such as: News, Business, Tech & Science, Arts & Culture, Food & Dining, Travel, Style and more. After downloading the app onto your device, you set up an account and then you choose the sections you want to keep up with. Flipboard populates the sections with articles. From there, you open the category and start flipping. Flipboard shows the first paragraph or so of the article and if you want to read the whole article, tap it and it opens on your device. Flip through the pages and when you’re done, back arrow and you are returned to main article lists. If it’s an article you want to share with others, there is a “share” icon where you can post it to social media, send it via email or save it. You can even search for individual people, hashtags, events, etc. and Flipboard will return articles related to that search.

Since you create an account, you can use that same account on all of your devices so it doesn’t matter what you have on hand, you have access to your selections. I find that I use Flipboard a lot on my phone while I’m standing in lines and then at home, I use it when I’m on my tablet.

The amount of news is overwhelming at times. With Flipboard, I feel I can keep it under control and still keep current on what’s happening around me.

End of Article….

Analysis of Yahoo Voice Password Leak – 453,441 Passwords Exposed | Sucuri

Have you noticed an increase in spam from those you know with yahoo, hotmail, aol or gmail accounts? There’s a reason for that. Apparently, there was a massive leak of Yahoo passwords and since many people use the same passwords for several sites, it was easy to hijack those accounts. From the link in this article, you can check if your email has been hijacked and is being used to send spam. Whether it is or isn’t, you should consider changing your password.  Also, take a look at the password list. Notice how many people are using simple, easy to guess passwords. Check out my post on creating strong passwords - Maybe My Password Isn’t As Strong As I Thought It Was

We recently heard that a massive leak of Yahoo passwords has been floating on the interwebs for a few days. According to Ars Technica, the dump is from Yahoo Voice and the data was released in clear-text yes, clear text in 2012. It seems they were not storing the passwords securely.We got access to the dump and we can confirm that this leak is valid. We can not however confirm it is from Yahoo, the password analysis does not have many “Yahoo’s” in it we’ll explain later.That said, we recommend all Yahoo users to change their passwords ASAP! Specially on other services that you are reusing the same passwords. Better safe than sorry.

*You can check here if your account was part of the leak: http://labs.sucuri.net/?yahooleak

via Analysis of Yahoo Voice Password Leak – 453,441 Passwords Exposed | Sucuri.

An Easy Way to Stay Safer on the Web, with OpenDNS

Since this post is going to be a little technical, I’m going to start by defining some of the things that will be discussed.

DNS – Short for Domain Name System (or Service or Server), an internet service that translates domain names into IP addresses. Because domain names are alphabetic, such as askbillfirst.com, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, a DNS service must translate the name into the corresponding IP address. For example, the domain name http://www.askbillfirst.com might translate to 208.109.14.108.

Domain Name – A name that identifies one or more IP addresses. For example, the domain name microsoft.com represents about a dozen IP addresses. Domain names are used in URLs to identify particular web pages.

URL – Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web (www).

When you access the internet and type in a URL, the name you entered is sent to servers that translate the letters you typed into the corresponding IP address for that site. Generally, those servers are set by your internet provider. There is no filtering involved with these servers. Therefore, any website that you attempt to go to will pass back to you whatever it has on it, both the good and the bad.

Now, there is a way to set up your computer, or your network router, to protect you from visiting sites that may cause you problems. One company that allows you to filter web content, protects you from phishing sites, and other things is OpenDNS. OpenDNS is used for content filtering. It filters content based on categories of sites, such as gambling, pornography, social networking, humor, and more. These sites may not be malicious, but they could be considered unacceptable types of content. OpenDNS is often used in place of parental control software.

To set this program up you’ll need to modify your network adapter settings. If you use both wired and wireless connections, you’ll need to modify both adapters. If you want to set this up so it protects everyone on your network, you can make the settings in the router and they will filter to everyone on the network.

You can find the instructions for OpenDNS here.

These settings will work on both PC’s and Mac’s whether you set it at the pc level or the router level.

Do not use this in place of a good anti-virus, but use it along with a good anti-virus for an easy way to stay safer on the web.

UPDATE – Laura from OpenDNS informed me that ” OpenDNS actually works as a security filter as well. It protects you from phishing websites, as well as blocking Malware like the Conficker virus. We’re seeing a lot of users — both home and business — choose OpenDNS specifically for the security it provides.” Thank you Laura for that update.

Internet Explorer Compatibility with Chrome

If you use  Chrome as your primary browser, you may have run into an internet page that works best under Internet Explorer, or actually requires Internet Explorer. I ran into this the other day when I was helping someone with a problem they were having in Yahoo Mail, in which the right-click copy/paste function wouldn’t work in Chrome but worked fine in IE. In researching it, I found that this problem has existed for quite a while. A day or so later, I was logging onto a site and it wouldn’t load, only to find out that Chrome wasn’t a supported browser.

The answer to these problems is a  Chrome extension that works wonderfully - http://www.ietab.net/home (you’ll also see the link to the Firefox Add-In on this page). With this tool, you right-click on the page to have it rendered in Internet Explorer. When you right click, you’ll see a menu option for “IE Tab Options.  Under IE Tab Options, you can set which version of IE you want to emulate, from versions 7 to 9.

Email: Spam, Virus or Clean?

Not sure if you’ve noticed, but there are a lot of emails being received that have a few lines of gibberish followed by a hyperlink, and often times a nice motivational quote. Many times, these emails are coming from someone you know. How are these emails getting past the spam and virus filters you have in place? Why isn’t your antivirus program stopping them?

Well, first, most of these emails are coming through as plain text, with no formatting like HTML emails have. Spam filters usually are looking for key words, phrases, or graphics. With these emails, often times there aren’t any “key” words that will trigger the filter. As for the virus, there usually aren’t any attachments, just a hyperlink, again, nothing that will trigger the filter.

The following is a sample of a text based email with normal words and a hyperlink. Also note that it’s not addressed to me but I received it anyway so it must have gone out to a group. Click on the examples that follow to see them full screen. They will open in a new window so when you’re ready to move back to the article, just close the image window.

It’s a lot more difficult getting an HTML formatted email through spam filters but some do get through. The following is an example for comparison sake between an HTML format and Text Only format:

And then there is the email trying to convince you that it’s okay to open the attachment to print or verify the information they’re telling you about in the email. In this case, the email is stating that I paid property tax on property in King County, where ever that is. Since I don’t remember doing that, maybe I should print the document to see what they’re talking about. Well, wouldn’t you? Except for the fact that none of the reference numbers match up, from the payment confirmation to the reference number to the number on the attachment, none match. Notice also that the attachment is zipped. This is a common method of hiding a virus to get it past the filters.

 

Well, I didn’t open it. It forwarded it on to scan@virustotal.com and in less than 5 minutes, I received the following report. Note that virustotal scanned the file against 40 some antivirus engines and most came back with no virus found…but 4 of them did find something. That was good enough for me. I deleted the email.

Image

I hope this helps clarify those emails you’ve been getting.

Oh, and by-the-way, if you get an email similar to the ones above from a friend, have them change their email program’s password as it’s possible that their email program has been hijacked.

Follow

Get every new post delivered to your Inbox.

Join 199 other followers