Monday, October 17, 2011

Cyber Threats Forecast for 2012

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy. Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2012. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.

Sunday, October 16, 2011

Speed Up Your Windows XP

Pursue Some tricks we can make our Windows more faster that never happen before and usually these all are unnecessary for each time. Some features are usually for only looking attractive. Optimizing Display Settings Windows XP mostly like for its visual interface. We do not interfere that but on this visualization has more extra feature that does not need ever without wasting system resource. Lets see how we can disable it-
1. Go to Start Menu
2. Click Setting.
3. Click Control Panel
4. Click System.
5. Go Advance Tab
6. Click Setting under Performance group
7. Off only the following ticked
* Show Shadows under Menu
* Show Shadows under Mouse Pointer.
* Show Translucent Selection Rectangle
* Use drop shadows for icons labels on desktop.
* Use visual style on windows and buttons

OPTIMISE YOUR PAGEFILE

If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.
1. Right click on My Computer and select Properties
2. Select the Advanced tab
3. Under Performance choose the Settings button
4. Select the Advanced tab again and under Virtual Memory select Change
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file. Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

REMOVE THE DESKTOP PICTURE 

Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.
1. Right click on Desktop and select Properties
2. Select the Desktop tab
3. In the Background window select None
4. Click Ok

REMOVE FONTS FOR SPEED

Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.
1. Open Control Panel
2. Open Fonts folder
3. Move fonts you don’t need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.
Enhanced by Zemanta

Wednesday, October 12, 2011

SA Symantec Intelligence Report

Johannesburg - Symantec on Tuesday announced the results of the September 2011 Symantec Intelligence Report, which saw phishing attacks in South Africa increase once again.

The country is now positioned as the most targeted geography for phishing, with one in 133.1 emails.

This month’s analysis also reveals that a deluge of malicious email-borne malware has left a clear mark on the threat landscape for September. Approximately 72 percent of all email-borne malware in September could be characterised as aggressive strains of generic polymorphic malware, first identified in the July Symantec Intelligence Report. At the end of July, this rate was 23.7 percent, in August it fell slightly to 18.5 percent before soaring to 72 percent in September.

“This unprecedented high-water mark underlines the nature by which cyber criminals have escalated their assault on businesses in 2011, fully exploiting the weaknesses of more traditional security countermeasures,” said Paul Wood, Senior Intelligence Analyst, Symantec.cloud.

Further analysis reveals that the social engineering behind many of these attacks has accelerated with the adoption of a variety of new techniques, such as pretending to be an email from a smart printer/scanner being forwarded by a colleague in the same organisation has been detected.

“The idea of an office printer sending malware is an unlikely one, as printers and scanners were not actually used in these attacks, but perhaps this sense of security is all that is required for such a socially engineered attack to succeed in the future,” Wood said.

Although spam levels remained fairly stable during September, Symantec Intelligence observed the use of identified vulnerabilities in certain older versions of the popular WordPress blogging software on a large number of web sites across the internet. Spam emails containing links to these compromised web sites are being spammed out. It is however important to note that blogs hosted by WordPress itself seem to be unaffected.

Additional research reveals that JavaScript is becoming increasing popular as the programming language used by spammers and malware authors. Spammers use it to conceal where they are redirecting pages, and in some cases, to conceal entire web pages.

“For spammers, hosting simple JavaScript obfuscation pages on free hosting sites can increase the lifetime of that site before the site operator realises the page is being used for malicious activity,” Wood said. “JavaScript is popularly used for redirecting visitors of a compromised web site to the spammer's landing page. While some of these techniques have been common in malware distribution for some time, spammers are increasingly using them.”
Originally posted on iol scitech
Enhanced by Zemanta