Tag Archives: Anti-virus
IoT: Evolving like never-before…
Seventeen years after British entrepreneur Kevin Ashton first coined the term Internet of Things (IoT), it’s now a part of our day-to-day existence. There is also the estimate that by the turn of the decade, the number of objects that would be part of IoT would almost touch the 50 billion mark. Internet of Things, which refers to the network of physical objects, devices etc connected to the internet, now touches diverse spheres of our very existence. Well, great news this certainly is. But how secure are we when we step inside the IoT territory? This is a very relevant question; security is a matter of great concern for all users now, especially regarding IoT. Challenges are many and profound and there always exists the big, physical threat of cyber attacks looming large over IoT technology.
The threats- A closer look
In the near future IoT would turn more pervasive and users would tend to connect more smart devices to the internet. Well, we are living in an era when many household appliances and day-to-day devices are ‘smart’ or internet enabled. These range from cameras and televisions and medical apparatus to many smart applications, household things and automobile security devices. All this makes life easy for us. But doesn’t that add to out security worries? Just imagine how it would be if some hacker manages to get control of the security cameras, alarm systems and door locks of an apartment building or a commercial complex. Just imagine how it would be when hackers get into the security system of a hospital and play mischief with devices. Just imagine how it would be when hackers hijack your automobile security system and it goes all wrong. How would it be if you get spied in your own home via an internet-connected camera, kitchen appliances or television?
This kind of a threat in the realm of internet security becomes much relevant because it’s not just about hacking your system and getting it all go wrong on the machine. This is not just about stealing your personal data and robbing you of your money, which of course is a grave issue in itself. This is more about making a direct attack on your physical world and causing you more personal kind of damage. This is also about invading your private spaces and even affecting your health or mobility. Criminals can simply break into your personal life and cause you sufficient damage. Doesn’t that make it alarming? No wonder that over 65% of internet users are highly concerned about data theft and security breach that could happen to them via the applications, devices etc that they connect to the internet.
The Internet of Things Security Foundation (IoTSF), launched in 2015, works on securing IoT by promoting knowledge and best practice. Users worldwide see anti-virus vendors to help them out of this internet security issue too.
Well, with IoT technology going real strong and having a bright future, we all have the right to be highly concerned about the security aspects…at all times!
Recent leaks based on Snowden’s testimony reveal that government agencies targetted antivirus softwares and spied on company emails to collect consumer data.
Law-abiding citizens all over the world, especially in UK and the USA, have more reasons to be worried about. For one, their ongoing struggle with spyware and malware creeping into their personal computers is a long-standing ordeal.
And although there are antivirus softwares for consumers to combat this problem, it’s here to stay. Not because the antivirus and firewall manufacturers or their products are incompetent; infact they are only getting better. The problem lies with the governments, particularly of these two countries, who are employing their intelligence agencies to intercept antiviruses so that they can sneak into their citizens’ personal space.
This further ascertains the popular public speculation that intelligence bureaus like the Government Communications Headquarters (GCHQ) and the National Security Agency (NSA), belonging to UK and the USA respectively, are hell bent on snooping on their citizens.
The issue is making headlines based on a recent report published in The Intercept, an online magazine dedicated to the cause of reporting, among other things, “documents previously provided by NSA whistleblower Edward Snowden.”
Web portals like TechCrunch and Gizmodo have reported that Russia-based Kaspersky Lab is one of the cybersecurity companies targeted by the agencies. Reportedly, the agencies used what is termed Software Reverse Engineering (SRE) to understand the software build and find loopholes for them to sneak inside the users’ computers.
Not only did the NSA and GCHQ try to invade the antivirus programs, the agencies even tried (maybe succeeded) to infiltrate the emails of officials in such companies to discover any possible flaws in the softwares. As an example of how capable these agencies were in snooping the public, the recent leak testifies that the GCHQ collected information on as many as “100 million malware events every day.”
The world would be a better place if only the Big Brother and its henchmen redirect their focus on the deserving enemies instead of spying on their citizens.
Manish is a former journalist who works as a blog consultant for Comodo. He completed his Master’s in Corporate Communications in 2011 from Lindenwood University in Saint Charles. As a tech blogger, Manish has a penchant for writing about the latest trends in the InfoSec industry. You can find him on LinkedIn (https://in.linkedin.com/in/manishnepal).
This virus is a type of spyware that induces the non stopping pop ups interrupting the computer operations. This spyware causes greater destruction and damage, literally interfering the normal operations of the computer, making the computer user to treat that as a challenge. The Icodec virus is known for its intrusive nature that it often displays ads whether you want it or not. Initially check whether the problem is really caused by Icodec virus taking and then make further process to remove it
Guidelines to identify and remove the Icodec Virus:
- If you find any pop up windows that are not coming from websites that you frequently browse. check if your PC is infected with Icodec virus. This Icodec virus, causes pop-ups informing that your PC is in danger, guiding you to download free antivirus software. These pop ups may vary from adult pop ups to gambling websites. For your information these pop ups that are meant to carry threats hints us with a yellow triangle that flashes on on top corner of the pop up window. Hence be aware.
- Check whether programs pmsngr.exe and pmmon.exe are running on your PC.
- While clicking and holding “Ctrl + Alt + Delete” simultaneously, click the process tab, if you identify any pmmon.exe and pmsngr.exe, you can be sure of Icodec virus vulnerability.
- Start your PC in safe mode to remove viruses. You can do this by holding the F8 key while rebooting your PC. A list of Start options shows up, opt for “Safe Mode”.
- Take off the Icodec folder that is found on your PC. To remove the Icodec folder, go to the Progarm folder while in safe mode and check for a folder named IcodecPack, once found drag the folder to the Recycle Bin and also delete the contents of the recycle bin. this helps us to independently remove the file.
- Reboot your PC, change the safe mode to standard mode. If the the symptoms are found appearing back again, start the PC again in safe mode and remove the Icodec folder again.
- While installing the software, pay close attention as the software installer allows optional installation like HDvid-Codec V9.0 adware. Do not randomly agree to install the optional ones.
- Prefer customized installation and do not select unknown files, specifically those unknown software that you do not want to download.
In short do not install any software that you are not sure of.
CryptoLocker, also nicknamed ‘ransomware’, is the latest weapon invented by cyber criminals to extort money from the users. Unlike the other online scamming techniques, this tactic is less scheming and more profitable. CryptoLocker virus is a new type of malware, a Trojan Horse, predominantly distributed via emails to infect the system, encrypt the files, and demand ransom for the decryption key from victims. A new variant called CrptoLocker 2.0, discovered in December 2013, is significantly more potential than its predecessor encrypting more file formats and propagates via USB drives. It renders Windows Key, Escape (Esc) Key, and ALT+TAB features inaccessible.
With an impressive record of infecting more than 300,000 systems within a short span of 3 months, CryptoLocker virus 2.0, alias Prison Locker, found its match in Comodo Endpoint Security Manager (CESM). The software detects and prevents threats by segregating safe and unsafe applications. It then isolates all applications whose legitimacy cannot verified. It it is a known threat, the anti-virus will prevent from damages. If it is an unknown threat, Comodo’s unique Auto-Sandbox feature and the Host Intrusion Prevention System (HIPS) will block and prevent it from infecting the operating system. Therefore, before CryptoLocker becomes a menace, CES automatically sandboxes it preventing encryption of files.
Get complete details about How to defeat this virus from your pc at https://blogs.comodo.com/comodo_news/cryptolocker-2-0-are-your-ready-we-are/
The Comodo Enterprise Security Manager 3 (CESM) is for a fact unprecedented because it is only anti-malware program that offers 5 layers of in-depth defense (HIP, Firewall, Anti-virus, Auto-Sandbox, and File Rating) to the impact point (desktop). This effectively means that your system is 100% secure from CryptoLocker virus. The fact that Comodo Antivirus installations have crossed 70 million with a clean record is a further emphasis on the strength of the software. Comodo also provides CESM users with $,5000 free warranty against virus.
The Endpoint Security Manager provides a powerful anti-malware that effectively coordinates threat protection on endpoints (local and remote) from a browser-based console. This design assists system administrators to centrally manage their desktops, laptops, and server endpoints. So, when an user clicks on a malicious message that contains CryptoLocker virus, the ESM detects and sandboxes it automatically and alerts the admin. The administrator will first view the files in the sandbox, select the malicious programs, remotely access end user’s system, select the malicious application running on sandbox, and delete it. Easy to say and simple to execute.
In November 2013, the US-CERT warned of an impending rise in CryptoLocker, but also assured that organizations using CESM were guaranteed to stay and be protected. Powered by the same technology as Comodo Internet Security (CIS), CESM possess other potentials such as centralized monitoring known and unknown files (sandboxed and malicious), encrypted VNC sessions to endpoints (local and remote), auto-synchronization of endpoint through Active Directory, and Windows 7 Embedded (standard version) support.
CryptoLocker ransomware is a grave threat and is on a rapid rise. What you need is not just protection but a ‘stubborn’ protection against it. With a proven track record in security services, Comodo Endpoint Security Manager is undoubtedly the best choice.