Friday, April 24, 2009

Chapter 8 Article: Fake security software scammers jump on Conficker



The article I chose warns consumers about the risk involved with downloading software even if it is supposed to be helping you get rid of malware on your computer. This article specifically talks about a worm called Conficker that has recently infected 3 to 10 million PCs worldwide. “Those controlling Conficker have yet to use it for malicious purposes, but the vast number of machines that are infected means the botnet could be capable of devastating denial-of-service attacks, spam campaigns or widespread data theft.” (Kirk, 2009)

Since the worm has gotten into so many users computers and is potentially very dangerous all who know they are infected are looking to get rid of the worm which brings up the main issue in the article; hackers trying to make a quick buck or infect more PCs through fake security software. Hackers have been getting into Google’s search engine and creating websites full of search terms that lead these unsuspecting and Conficker infected PC users to software they think will eliminate the worm from their machine but realize once they pay for the downloadable software that it does not get rid of the problem and now not only are their computers infected but they are out around $40. The article goes on to say that the fake software will ask the user to download software to scan for the worm. When the scan occurs and the fake software discovers a worm is not present on the user’s computer it prompts the user to actually download the worm. The user will do this willingly because on their side the software has told them that they are infected.

This article ties in perfectly with chapter 8 and its emphasis on computer user’s vulnerability. The chapter warns about the dangers and capabilities hackers posses and teaches ways to avoid being so susceptible to malware. In this case Conficker got into computers by taking advantage of flaws in Microsoft Windows server services or by brute force through weak passwords. After reading the chapter and knowing the dangers of these threats we can set stronger passwords and also not be so quick to download from an unreliable source.

The more I learn in this class the more weary I become of using technologies and having my personal information available to people through these portals however if we take the right precautions as chapter 8 directs us to we may be a bit better off. The only way to completely protect ourselves from these types of attacks is to take out the technologies in our lives altogether, however it is in no way realistic. I barely even talk on the phone at my office. Everything is done via e-mail and I love it because it is so convenient and efficient. We do though need to be aware of risks and take proper steps to prevent them in our future.

Kirk, Jeremy. (March 31, 2009). Fake security software scammers jump on Conficker.
Retrieved April 24, 2009, from http://www.infoworld.com/d/security-central/fake-
security-software-scammers-jump-conficker-469?page=0,1

1 comment:

  1. I agree with you that it is not worth it for us to remove technology from our life so that we can be safe from hackers, it like saying that we should never drive to prevent car accidents. However, there are ways that you can minimize the risk of being attack by only download well recognized software from trust website.

    ReplyDelete