This Section of our site offers advice, information resources, and itemizes the most Critical Malware Alerts we find in the Alerts and Warning services we subscribe to. Our intent is to help in the ways we can with the security of our Customers systems. This is NOT a complete list of Malware by any means. Please check here ONLY as a supplemental source to your primary sources.
You may want to review our Spam Notification sites. Spam is a disabling nuisance to your operations, Using the filtering tools in your Networking Software and Email Clients can help bounce spammers or put their mail in junk folders. The links listed point to companies and organizations that help identify spammers for you to handle as you need to. If you find your company on these lists by mistake, there are links to help get it removed. If removal is difficult contact CCS Retail Support, we can try to help.
Check the New Critical Alerts Blog for New Malware threats.
The best approach is to have a well-balanced and complete strategic plan to combat Malware that attempts to compromise your systems. We suggest the following steps be taken
- Use a Resident Malware Protection program for your desktops and servers as primary protection. For Windows we suggest AVG as good protection and low overhead.
- Use spamassassin and other scanners for your Linux and UNIX servers. We have a list of the most helpful tools and deployment experience. (See below)
- Use several alternative non-resident Malware scanners on a periodic basis as secondary protection. We can recommend some products for you. (See below)
- Subscribe to Malware Bulletin news links and use alert services such as our service and Google Alerts. (See below)
- Have a written plan that describes what to do if your operations become infected. Make sure your staff knows how to look for potential infections, what to do if an infection is suspected, and what to do to minimized the spread of a confirmed infection.
- Keep some CCS Support hours available for emergency help from CCS Retail.
Related CCS Blog Articles
Check if Your Account has been Hacked – pwnedlist.com
I’m sure we all live in a world where we assume our accounts are all safe as long as we can still use them regularly. Same goes for our banking account, as long as the amount does not disappear suddenly, we will assume our account is safe.
What if I were to tell you that your account is already hacked and someone knows your username and password? By having these two criteria, it is sufficient to enter into sites like Twitter, Facebook, Tumblr, Paypal, and many more to try out your username and password combination.
I’m sure today with every one of us holding at least 5 online accounts, we share the same username and password between accounts. If you are one of those, you are at the right place for today I am going to share with you a site where you can check whether your account is hacked or compromised.
Pwnedlist.com is a creation of two security researchers Alen Puzic and Jasiel Spelman from DVLabs, a division of HP/TippingPoint. What you need to do over there is to enter the username or not the password) which you usually used to login into any online websites and hit the Check button. In just seconds, the result will be shown whether your account is compromised or not.
Windows Malware Software Sources
You can find the sites with Google. Many of these vendors have non-commercial versions or trial versions. Non–commercial versions are not suitable for resident, online protection. Use them for secondary, periodic scans.
- Avira AntiVir
- Avast Antivirus
- MalwareBytes (Excellent at detecting Trojans)
- Microsoft Security Essentials
- Norton Antivirus
- PCTools Spyware Doctor (Finds threats others miss)
- Spybot Search and Destroy (Good All-a-round tool)
- StopZilla (Finds the harder Trojans and less common threats)
- SuperAntiSpyware (Excellent at detecting Adware)
Linux and UNIX Malware Software Sources
These are typically open source projects with multiple platform downloads. You should ask for help with installation, if you do not have a technical background. Google them for more details and their Home Pages.
Malware Information Sources
Use your favorite search engine to locate more sources for information. These are a few sources we recommend:.
Use these sites to identify Spammers and Email accounts used by spammers. Setup your Network Filters (TCP/ip filters) and Junk Mail filters to block these spammers as you find them. Search with the databases maintained by these organizations to confirm known spammers. If you need help with your filters contact CCS Retail Support.