Safety & Security

How to be aware of malware

In a day and age when security is the foremost concern of any business owner or community member, one can never be too careful.
As technology has evolved, so have the threats, like malware, which could not only affect our daily lives, but our data too.
Malware encompasses all malicious software threats and social engineering tools that are created to compromise, vandalise and infect computer systems.
Malware comes in all shapes and sizes, and every business owner or reader should actively protect themselves from malware security threats.

Type of malware include :
• Viruses are not limited to infecting operating systems only, they can attack your hardware components through firmware which is referred to as firmware viruses.
Although Firmware viruses are difficult to execute without the user of the computer realising they are being attacked, it is still possible should the attacker obtain your firmware code.
Other viruses like Boot sector virus attack your information used to start the computer which lies in the boot sector of the computers file system.
Script viruses are more common as they run in the background of web pages that usually contain malicious advertisements. They are executed when the web page is visited.
Email attachment viruses mostly come from users whose computer has been compromised.
This type of virus infects the host’s electronic address book and spoofs the sender’s address when replicating.
All viruses must infect a host file before replicating on other files.

• Worms are a form of malware which do not need to attach themselves to another executable file.
They replicate over network resources from the computer’s memory.
Their main purpose is to consume resources and ultimate slow a system down.

• Trojans, like the Greek story of the Trojan Horse, is a programme which is disguised to be something else or less threatening.
They function as backdoor applications and once installed allows the attached data to access the PC and perform tasks such as uploading files and installing the software.
The attacker can use the infected computer to launch mass-mail spam or denial of service attacks as a botnet.

• Spyware monitors exactly what activities you as the user are performing.
They can log your keystrokes in attempts to steal confidential information (credit card numbers, ID numbers, passwords etc).
Spyware can also launch pop-up windows to direct you to visit malicious web pages.

• Rootkits are often used to carry out wide-scale attacks compromising several computers.
They manage to gain control of your computer without revealing their presence by replacing key system files that could detect or eradicate them.
Flying under the radar, rootkits can run your computer with system-level privileges, providing a backdoor for the hacker to steal information, install additional malware and execute other tasks from a remote location.

• Ransomware is used to most commonly encrypt hard drives with sensitive information to extort money from the victim.
The hacker will threaten to release the information if payment is not made and unencrypt the information if payment is made.
Ransomware is capable of encrypting removable drives, therefore, backups could be compromised.

Symptoms of malware include:

• Files become corrupted or deleted easily.

• The properties of your file system change such as the date stamps, permission attributes and file size.

• The computer fails to start-up or you experience lockups.

• New files appear in your system folders that have file names similar to other executable files.

• Frequent application crashes.

• Slow performance on your computer and the network.

• Internet connections are disrupted.

• Pop-up web pages without opening the browser, the home page or search engine changing suddenly, search results that are different from other computers and redirection.

• Indication of a rootkit or Trojan is if you see unfamiliar processes running or if other users are receiving spam emails from you.

What to do to prevent malware attacks:

• Update your anti-virus software regularly. Anti-virus software uses a database of known virus patterns and malware techniques to identify viruses and prevent them from spreading, the more you update, the better defence your system has.

• If you suspect your computer of being infected, disconnect from the network immediately and consult your IT technician.

• Do regular backups on removable hard drives however, do not leave them connected to your computer after use. This prevents ransomware from encrypting your removable drive.

• Double-check the files you restore to ensure they are not infected before copying them over to removable drive.

• Scan unfamiliar removable devices such as USB devices before use. Select safely remove the device from the notification area on your taskbar before removing USB devices.

• Avoid visiting unsavoury websites.

• Do not open links in unsolicited emails.

• Do not open email attachments with unfamiliar file extensions.

• Do not log on to your computer with administrative privileges unless necessary.

Information provided by Tamsin McMaster – National diploma in Information Technology and Comptia A+ certified.

Burglaries

Cell phones, Laptops, Smart TV’s, tablets, cameras or any expencive electronic devices and jewellery. On small holdings and farms they tend to take chainsaws and brush cutter as well.

 

“These syndicates are not just involved in stealing vehicles. They are into all types of crimes, from CIT heists to drug trafficking.” John Meintjies head of the CPF Nelspruit.

Here are a few tips to know

  1. Always ensure that valuables are locked away.
  2. Ensure that your windows at home are closed when going to bed.
  3. Train your domestic workers with regards to who may enter your property. Ensure your domestic worker does not open for any person unless he or she has made contact with you and you gave the instruction.
  4. Test your security systems regularly and arm them when you are at home and away.
  5. Know your neighbour. This is a basic principle that is not hard to implement.

Make sure to always be aware of your surroundings at all times, criminals are everywhere.

Armed Robberies

Jacques Meiring of Divergent Ops, explains what to do when you are being robbed at gunpoint?

  1. Try to stay as calm as you can. If a robber is pointing a gun at you, don’t shout at them, scream, or make sudden movements.
  2. Comply if they command you to look away or stop talking

How do we prevent it ...

  1. Give them what they ask for instead of fighting back. Defend your life, not your possessions.
  2. Fight for your life only if it’s absolutely necessary.
  3. Call emergency services when you can safely do so.

Students walking to school,

consider this:

Children are each different, so consider their individual developmental and maturity level when deciding if it is safe for them to walk to school without an adult. Some children may not have the skills to focus on safe pedestrian behavior until they are 10 or older.

• Make sure they stick to a safe route to school, one with well-trained adult crossing guards at every intersection.

• If they need to cross any streets on the way to school, practice safe street crossing with them before the start of school. Ideally, they should walk with at least one neighbor child or older sibling.

• Make sure they know how to say “no” if someone they don’t know offers a ride, and that they yell and run for help if needed.

Business Burglaries

According to Johnny Kerswell of HI-Tech security these are the type of items that get stolen in business burglaries.

Type of items that get stolen in business burglaries:

Cash, Cell Phones, Laptops and jewellery.

Depending on the business. If its Edgars it would be Jewellery, sunglasses, branded clothing and shoes, perfume and cellphones.

They also shared their top 5 crime tips:

  1. Do not leave valuables in vehicles
  2. Always arm your alarm even if gone for a short period of time
  3. Open windows lead to crime – fishing method
  4. Create a security resistance using all factors, physical security and technological security for example physical: Dogs, lights, safety gates, perimeter fence and burglar proofing. Technological : Alarm system, external alarm sensors and camera systems
  5. Always have a means of communication ensure you have a backup communication system.

Vehicle Thefts

ACS gives tips on how to prevent vehicle theft.

 

  1. Park your car in a locked garage
  2. When not at home, park in well-lit areas
  3. Install an audible alarm system and anti-theft device
  4. Do not leave valuables in your car
  5. Most important, install a proper tracking system. There is over a hundred tracking companies in South Africa.

Toyota Hilux, Toyota Fortuners, Ford Rangers, VW Golf 6, VW Golf 7 and VW Golf 8.

ACS gives some tips

When your vehicle gets stolen, report it immediately and have the following

information ready:

-Make, model and colour

-Registration number

-Know the tracking company’s unit

which is installed in your vehicle.

 

 

“These syndicates are not just involved in stealing vehicles. They are into all types of crimes, from CIT heists to drug trafficking.” Albert Greyvenstein

Back to top button