Wednesday, November 3, 2010

Microsoft Malware Protection Center (MMPC)

The Microsoft Malware Protection Center (MMPC) is the group at Microsoft that researches and responds to malware and potentially unwanted software. The MMPC provides the Microsoft Malware Protection Engine, the technology that underlies most Microsoft anti-malware security products and services. The Microsoft Malware Protection Engine relies on constantly updated definition files containing detection signatures for thousands of different malware and potentially unwanted software families. To develop these definition files and to respond quickly and effectively to new threats, the MMPC maintains research and response labs in the United States, Ireland, and Australia, with additional researchers in other locations.

The MMPC uses a number of different mechanisms to disseminate malware and security information to the public. The center maintains the Malware Protection Center website, a central source for malware and security information, definition updates, and malware sample submissions. The website includes an encyclopedia that provides detailed analyses of thousands of current threats, including technical information about the threat, how readers can tell if they are infected, and how to recover from the threat or avoid exposure to it altogether.

Tuesday, November 2, 2010

Using Email Safely

Anytime you send or receive communications on the Internet or browse a Web site, there are opportunities for individuals to intercept your communications to obtain your email address. If you post to a Usenet newsgroup, list your email address on a Web site, or fill out insecure forms on the Web, your address can be collected by spammers, individuals who use email addresses for commercial advertising to try to gain profit for themselves and to get rich quick.

Listed below are the most important tasks that are covered in this section:

•Never open attachments unless they have been first scanned with an antivirus software program.
•Don’t reply to emails requesting personal information.
•Don’t buy anything from spam email.
•Do not reply or click on links in emails or pop-up messages asking for personal information. Always go directly to the company's Web site.
Dangerous Attachments
Electronic mail can be a major source of security concern. E-mail attachments are an important medium through which viruses, worms, and Trojan Horses spread from one computer to another. Every email attachment is a potential threat to your computer’s security. Choose your email client software carefully.
Regardless of its origin, be cautious and don't open any attachment unless you know the sender. Also, never run or open any attachment from your email program unless it has been scanned with an up-to-date antivirus program. If you're not certain that your antivirus program is working automatically, save the attachment to your hard drive and scan it manually before you open it.

Protecting Against Spam
Junk mail, known as spam, is becoming a very lucrative business for those who use the Internet for commercial advertising. Since email is reasonably inexpensive, senders can blast it out by the millions at a rate much faster and cheaper than using other means such as that delivered by the postal service. Spammers can use automated programs to find email addresses on the Inter­net very quickly. Unchecked, spam will not only overwhelm legitimate mes­sages but may include viruses that can be dangerous to your computer. Always run antivirus software and keep it up to date.

There are several ways to prevent spam email from reaching you:

•Block junk email. Many email programs have built-in filters that can help you separate spam from your wanted email. You may also try to enlist the help of your Internet Service Provider (ISP). The current version of Microsoft Outlook offers more sophisticated filtering capabilities than earlier versions.
•Hide your address from spammers by setting up a separate email address dedicated solely to Web transactions. Also, watch out for checked boxes when buying things online, as this may indicate that you are giving the company permission to sell or give your email address to other parties.
•Review privacy policies when signing up for Web-based services. This policy should outline the terms and circumstances regarding whether the site will share your information.
•Avoid listing your email address in large Internet directories.
•Don’t set up email accounts to generate automatic responses while you are away from the workplace. This will only verify your email address to those spammers who send you spam while you are away.
•If you have an email address listed on a Web page, consider opening or using a free account. If the Web site is University- related, consider using a departmental account and put that address on the Web page.
Despite your best efforts, you will probably still be subject to a certain amount of spam. Some tips for dealing with spam are:
•Don’t reply to any emails asking for information. If the spam seems to be coming from a disreputable source, do not follow the unsubscribe directions. This only verifies your true email address.
•Don’t buy anything from a spam email.
•Treat an email from a charity asking for money as spam. If you believe in the charity, contact them directly.•If you can’t confirm that the sender is valid, delete the message immediately without opening any attachments.
•Don’t forward chain email messages, such as messages that state "Send this on to all of your friends."

Using Email Safely

Anytime you send or receive communications on the Internet or browse a Web site, there are opportunities for individuals to intercept your communications to obtain your email address. If you post to a Usenet newsgroup, list your email address on a Web site, or fill out insecure forms on the Web, your address can be collected by spammers, individuals who use email addresses for commercial advertising to try to gain profit for themselves and to get rich quick.

Listed below are the most important tasks that are covered in this section:

•Never open attachments unless they have been first scanned with an antivirus software program.
•Don’t reply to emails requesting personal information.
•Don’t buy anything from spam email.
•Do not reply or click on links in emails or pop-up messages asking for personal information. Always go directly to the company's Web site.
Dangerous Attachments
Electronic mail can be a major source of security concern. E-mail attachments are an important medium through which viruses, worms, and Trojan Horses spread from one computer to another. Every email attachment is a potential threat to your computer’s security. Choose your email client software carefully.
Regardless of its origin, be cautious and don't open any attachment unless you know the sender. Also, never run or open any attachment from your email program unless it has been scanned with an up-to-date antivirus program. If you're not certain that your antivirus program is working automatically, save the attachment to your hard drive and scan it manually before you open it.

Protecting Against Spam
Junk mail, known as spam, is becoming a very lucrative business for those who use the Internet for commercial advertising. Since email is reasonably inexpensive, senders can blast it out by the millions at a rate much faster and cheaper than using other means such as that delivered by the postal service. Spammers can use automated programs to find email addresses on the Inter­net very quickly. Unchecked, spam will not only overwhelm legitimate mes­sages but may include viruses that can be dangerous to your computer. Always run antivirus software and keep it up to date.

There are several ways to prevent spam email from reaching you:

•Block junk email. Many email programs have built-in filters that can help you separate spam from your wanted email. You may also try to enlist the help of your Internet Service Provider (ISP). The current version of Microsoft Outlook offers more sophisticated filtering capabilities than earlier versions.
•Hide your address from spammers by setting up a separate email address dedicated solely to Web transactions. Also, watch out for checked boxes when buying things online, as this may indicate that you are giving the company permission to sell or give your email address to other parties.
•Review privacy policies when signing up for Web-based services. This policy should outline the terms and circumstances regarding whether the site will share your information.
•Avoid listing your email address in large Internet directories.
•Don’t set up email accounts to generate automatic responses while you are away from the workplace. This will only verify your email address to those spammers who send you spam while you are away.
•If you have an email address listed on a Web page, consider opening or using a free account. If the Web site is University- related, consider using a departmental account and put that address on the Web page.
Despite your best efforts, you will probably still be subject to a certain amount of spam. Some tips for dealing with spam are:
•Don’t reply to any emails asking for information. If the spam seems to be coming from a disreputable source, do not follow the unsubscribe directions. This only verifies your true email address.
•Don’t buy anything from a spam email.
•Treat an email from a charity asking for money as spam. If you believe in the charity, contact them directly.•If you can’t confirm that the sender is valid, delete the message immediately without opening any attachments.
•Don’t forward chain email messages, such as messages that state "Send this on to all of your friends."