Friday, February 8, 2019

E-mail and the Web Become a Source of Malware Deployment

Kaspersky Lab stated that e-mail and websites are still a favorite of hackers to spread malware online. Kaspersky Lab's SEA Territory Channel Manager, Dony Koesmandarin, said that email usage continues to expand because smart phone users must log in via email.

Even children who want to play games must also use email to register. "The trend has shifted towards online, websites have become a place to spread malware. Email, everyone, especially in big cities have e-mail," said Kaspersky Lab's SEA Territory Channel Manager, Dony Koesmandarin, Thursday (7/2).

Kasperksy assessed that the spread of malware in 2018 is divided into two categories, which require participation from users to click or that can be directly entered into the device without any clicks.

Malware that requires public participation, for example when opening a site, appears a pop-up box that tells users to update the software. In fact, the update is a manipulation of hackers to insert malware into the device.

In addition, hackers also take advantage of vulnerabilities in the browser to include file-less malware on the victim's device. Malware that is in this category can be a local threat, entered through hardware such as USB or CD.

Based on data from the Kaspersky Security Network, Indonesia is ranked 62 in the world infected with malware in this way, far below Yemen which is ranked first with a percentage of 72.6 percent.

If viewed from a source of malware, Kaspersky noted that only 0.06 percent of attacks experienced by Indonesia came from servers located in the country.

Kaspersky recommends that Warganet install a whitelisting application to monitor any application that can run on the device. With the application, only applications that have been entered into the whitelist can run, outside the list it cannot.

Alternatively, users must know what applications are installed on the device, including on mobile phones.

Dony suggests to pay attention to anything that can be accessed by the application, do not arbitrarily click "yes" when installing a new application. In addition, try to always update (update) applications or software to overcome security holes.

No comments:

Post a Comment