Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Malware Hosted Websites

Malware Hosted Websites

With the increasing number of websites coming online and the establishment of well known websites, it is becoming more difficult for Internet surfers to avoid malware. Although the best way to avoid getting malware in your PC is to curb your clicking habits, even the most security-minded surfers can still be fooled by some of the tactics that cybercriminals use to install malware in your PC.

The explosion of online commerce has opened up a whole new venue for cybercriminals. While it is utterly impossible to dodge all of the cybercriminal activity going on altogether, if you have some knowledge of what they do and how they do it, you stand a better chance of protecting your PC against malware infection.

Websites With Malware

A high percentage of malware comes from websites and pop-up advertisements and sometimes it is nearly impossible for an Internet surfer to tell whether or not they have arrived on a website that is hosting malware. The following information will give you some insight as to how malware criminals work.

  • Redirections: When a cybercriminal creates malware they design it and host it on a small group of websites or specified number of emails. They gradually add more websites so one redirect can transport the visitor to another website, and then another, where they finally meet up with the malware infected site.

Most of the time this is done in a seamless fashion and the only way to tell you are being redirected is that the page may download slowly or the URL in the browser window changes during transmission.

  • Proxy Websites: Malware criminals create what is called "proxy websites." These websites are used to hide the malware for a longer period of time before it is discovered by the website owner. The problem with proxy websites is they can be dressed up to look like anything from a lesser known site to a well known site such as MySpace.

Cybercriminals often create fictitious accounts on well known websites and then install links that direct the visitor to the malware which is a site that is designed to look like the real thing.

  • Antivirus Software: Malware criminals who host malware on websites have also figured out a way to confuse antivirus software programs. They have packaged website malware differently so it can sneak by the antivirus program you have installed on your PC. Antivirus programs produce signatures that allow the program to recognize and block malware. If the malware is packaged differently by the cybercriminal it can easily slip by the antivirus program and into your PC.

Although the thought of all of the cybercriminal activity that is taking place on the Internet can make you paranoid, the best thing to do is constantly be aware, educate yourself on what cybercriminals do, and always be suspicious of any activity.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.