Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must have heard that such a tradegy is called identity theft and millions of people in the USA alone suffer the same every year. Poor consolation for its victims, isn't it?

Unfortunately, businessmen frequently are targets for identity thieves, especially online. Lots of articles on identity theft, "how-to-avoid" tips, and scary stories about the victims circulate through the Web and other media. The authors remind people again and again that they should be cautious when giving anybody their private info as well as care for their PCs' security. But in spite of all their effort identity theft is still the most rapidly growing crime.

Software developers are doing their best, too. They can't be of much help if somebody plainly looks over your shoulder and writes your credit card number down. It's for you to take care and never reveal your personal info to anybody who asks for it. What they can do is to create new solutions to the urgent problems like data stealing. Keylogging spyware--the very programs that make lots of such crime possible--are pretty much written about lately. These programs secretly monitor everything users do on their PCs.

Keyloggers are used--by themselves or as a part of a virus or a Trojan -- much more widely than PC users think; it is an open secret that the lion's share of identity theft that happens online is because of keylogging spyware. The losses caused by stealing PINs, logins, and other valuable data, are well comparable with the damage from viruses. Actually, if a virus or a Trojan contains a built-in key logger module (and it often does), the end user finds himself in a pretty tough situation. The problem is that most anti-keylogging programs warn users when it is too late. The data have already been captured and sent. Why does it happen?

Almost all anti-spy software existing at the present moment works using the same scheme: spy program is detected and then blocked or eliminated. Detecting viruses or spy software is the crucial step of the whole process--all the protection depends on whether the anti-spy software is able to detect as many spies as possible. Signature bases which all these products depend on, is actually the "list" of signatures ? small pieces of spy programs' codes. Anti-virus or anti-spy program actually scans the system and compares its codes with those in signature bases. So, in this case only the spies whose signatures already are in the base will be detected and eventually "caught". As long as anti-spy software is regularly updated and the system doesn't come across some unknown spyware product, everything is all right.

The problem is that lots of programs which could be used for stealing data are not included into signature bases right now. Some of them will never be.

There is good deal of people capable of creating something brand-new spy, unknown to anti-spyware developers. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when hackers make their biggest profits.

Spy programs can be created for the specific purpose, such as industrial espionage, so they will never be represented in the base. Moreover, some monitoring programs can be used as spy programs as well, though they are not always included into signature bases. As we can see, a signature base is the weak spot of anti-spy protection; it is, so to speak, a joint in the armor. Information thieves also know about it.

Fortunately, software developers are constantly looking for new solutions. One of the new trends in anti-spyware developing is not to use signature bases as means of detecting spyware. There is three basic advantages in such an approach. First, the product gets rid of its the least reliable part; second, there is no so urgent need for updates anymore; and last, but certainly not least-?the product becomes capable of blocking the destructive activity of even unknown spyware. To read more about this new approach follow the link in the signature.

When products of such a kind become widespread, there would be much more problems for hackers in future. However, there is no guarantee that no innovative spy software appears in response.

Whether we like it or not, all malware "evolves" very quickly; new schemes are being developed, and new software which online criminals create and utilize becomes more and more malicious and "selective". New keyloggers as well as keylogger-containing viruses and Trojans, appear all the time; the losses these programs may cause to a business are enormous. That is why in some businesses there is an acute need for separate anti-keylogging protection.

Alexandra Gamanenko currently works at the Raytown Corporation, LLC -- an innovative software developing company company. visit its website at http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More