RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Microsoft makes recommendations how to protect the computer from viruses and programs spies

01.02.11, 13:59, Msk

On the occasion of celebration of day of the safe Internet, the Microsoft company makes recommendations how to protect the computer from viruses and programs spies and also to keep safe personal data on the computer and in network.

The Internet began the fastest method of search of up-to-date information, contacts, the addresses and the most convenient solution for maintenance of communication with friends with which there is no opportunity frequently to meet long ago. The Internet has a set of advantages, but also and constitutes serious danger to computers of users.

According to data of Symantec company, the infected computers in the world becomes more and more, and they extend more and more spam and the malicious software. "Even more often the malware attacking your computer try to involve you in downloading of some software or in disclosure of personal information under the guise of absolutely innocent action. The social engineering becomes so widespread threat just because actions of the user of the computer, but not vulnerability in the computer, are exposed to the attack", – one of leaders of production of the software for protection of computers claims in the blog Symantec.

Daily threats when using of the Internet appear in the form of links in e-mail messages from a bank name, mobile operators, counterfeit notifications on behalf of websites of popular social networks, offers of acquaintance, etc. Besides, is frequent, having made a typo when writing the address of the website, the user gets on the resource similar the interface and inviting to participation in nonexistent actions for a small fee. That Internet users could save the personal data, files, photos on the computer and in network, the Microsoft company reminds of the basic rules of security:

  • 1. Install an antivirus on the computer;
  • 2. Regularly update software set on the computer;
  • 3. Download updates and programs from the official manufacturing websites of software;
  • 4. Use a licensed software – according to the statistics Media Surveillance of 53% of the keys downloaded on the Internet contain viruses and programs spies;
  • 5. All received URL links need to be analyzed before transition according to them;
  • 6. In conditions when malware use weaknesses of human character – curiosity, fear, carelessness – the role of the browser increases repeatedly. Use the browsers constructed on modern technologies of protection of users.

On researches of independent laboratory NSS Labs, 99% of threats of social engineering are blocked only by Internet Explorer 9 Beta while Internet Explorer 8 – 90%, Firefox – 19%, and other popular browsers – are even less. This high level of protection of the user of Internet Explorer against modern threats and loss of personal data is provided with technology of the SmartScreen filter.

Symantec claims in the blog: "Traditional approaches in antiviruses are not sufficient for our protection any more.<..> The approach based on reputation security became the key direction of 2010.<..> We will continue to improve protection mechanisms in Internet Explorer that our users were completely sure of the browser. For example, in Internet Explorer 9 the Tracking Protection technology which will announce all suspicious request made by web pages will be implemented", – Mamykin Vladimir, the Chief information security officer of Microsoft in Russia told.

The SmartScreen filter available in Internet Explorer 8 and improved in Internet Explorer 9 Beta, consists from:

  • anti-phishing protection — for detection of threats from fraudulent websites which try to catch personal data, such as user names, passwords and accounts information;
  • reputations of loading — for removal of all unnecessary warnings for familiar files and display of serious warnings for loadings with the high level of danger;
  • protection against malware — for prevention of hit in the computer of potentially dangerous programs.