2023/10/18

SECCURITY ISSUES 2

   PROBLEMA :

5. my mobile phone is asking me to install my operating system update but I do not feel like to do so… Do you think it is really important to update it, why?


FAKE SOFTWARE UPDATE

A fake software update is a notification that tells users they need to urgently update software on their device. When they click on the update link on a landing page, they unwittingly introduce malware into their device


https://www.nbcnews.com/tech/tech-news/fake-software-update-turns-computers-cryptocurrency-miners-n919691

https://forums.malwarebytes.com/topic/169086-android-fake-software-update-cannot-remove-it-for-some-reason/

https://www.geoedge.com/university/fake-software-update/

5 SECURITY TIPS

1. Install anti-virus and anti-spyware software.

Anti-virus and anti-spyware programs scan computer files to identify and remove malware. Be sure to:

-Keep your security tools updated.

-Immediately remove detected malware.

-Audit your files for missing data, errors, and unauthorized additions.

2. Use secure authentication methods.

The following best practices help keep accounts safe:

-Require strong passwords with at least eight characters, including an uppercase letter, a lowercase letter, a number and a symbol in each password.

-Enable multi-factor authentication, such as a PIN or security questions in addition to a password.

-Use biometric tools like fingerprints, voiceprints, facial recognition and iris scans.

-Never save passwords on a computer or network. Use a secure password manager if needed

3. Use administrator accounts only when absolutely necessary.

Malware often has the same privileges as the active user. Non-administrator accounts are usually blocked from accessing the most sensitive parts of a computer or network system. Therefore

.-Avoid using administrative privileges to browse the web or check email.

-Log in as an administrator only to perform administrative tasks, such as to make configuration changes.

-Install software using administrator credentials only after you have validated that the software is legitimate and secure.

4. Keep software updated.

-Regularly update your operating systems, software tools, browsers and plug-ins.

-Implement routine maintenance to ensure all software is current and check for signs of malware in log reports

5. Control access to systems

-Install or implement a firewall, intrusion detection system (IDS) and intrusion prevention system (IPS).

-Never use unfamiliar remote drives or media that was used on a publicly accessible device.

-Close unused ports and disable unused protocols.

-Remove inactive user accounts

-Carefully read all licensing agreements before installing software

QUESTIONARIE OF YOUR FAVOURITE TIP 


👉👈

1 comment:

  1. Thanks for your tips and comments of this problem. I like the fifth tip

    ReplyDelete