Do I Really Need An Antivirus Software For My Computer?

“I don’t use Anti-Virus software at all, I am just careful about where I go and what I click on”

“My computer gives me great performance, so I don’t think I require antivirus software”

“I don’t need antivirus software on my computer – it’s not connected to the Internet.”

Above mentioned comments were given by few computer users who do not use AV software. Are you one of them who think they do not require security software for their computer? If yes, then you must think twice.

Technological advancements in virus development have ensured that viruses operate without warning you to their presence. As Malware attacks are becoming even more sophisticated, your computer could be infected and you may not even know it. Window Pc’s and Notebooks have long been targets of virus creators. Lately even, Mac Pcs have been increasingly attacked with Trojan horses and other data stealing malware. Viruses can be accidentally installed onto your system from various programs files, Internet, or email attachments. They can also enter your PC via security holes in your operating system.

Unless you are completely protected, hackers can gain access to almost anything stored on your PC with the use of malicious programs.

Need an anti virus software

So, you still think you do not need antivirus software? Then have a look at the below points that will keep you safe even if you do not have an antivirus software.

  •  While browsing the web, one should never click on any third party software and applications, as it may carry malware.
  •  One should stop using the social networking sites, Spyware, Keylogger, Password cracker and Kazy Trojan via Adware infects the computer through social network.
  • One should not access emails, as spam and phishing emails are increasingly targeting consumers and businesses around the world. Users open email attachments and unknowingly download Malware onto their system.
  • One should never connect an USB to the system as threat via removable media like USB sticks infects the computer with Autorun.inf virus.
  • One should never use P2P file sharing software. Most of the times users download malicious software through P2P which carries Trojans and other malicious adware.
  • One must never open a PDF file, opening a PDF file can infect the computer, and can also allow hackers to gain access to your data.
  • And most importantly, one must not use a computer/smartphone to stay completely protected.

If a computer user is ready to follow the above restrictions without any compromises, than he/she can choose not to use antivirus software. But if the user misses out on any one of them, then he/she can easily become victim to malware attacks.

There are endless channels through which malware can attack a computer. Once it is in the system, it spread automatically, damages the system files and minimizes the performance of your computer. Therefore it is extremely important that antivirus software is present in the computer system. Below are few tips that will protect your system from such attacks;

  • Use antivirus software such as eScan that protects your system from all kinds of Malware attacks.
  • Enable firewall in your PC so that you can use local networks and the Internet safely.
  • Keep all of the applications and software installed on your computer updated.
  • Keep your computer’s security settings to a higher level.
  • Before downloading any program or software do through research about the reputability of the company that is selling the program or software.
  • Do not open an email attachment sent from an unknown sender, open it only if you are positive about the source.

To see whether your computer system is infected or not, use the Free eScan tool kit from here:

Posted in eScan 11 | Leave a comment

Vulnerability Recorded for the Week of July 14, 2014 – By US-CERT

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by their research department for the Week of July 14, 2014.

The National Institute of Standards and Technology (NIST) have recorded vulnerabilities, which are security weakness found in a program or operating system that can make a system susceptible to malware attacks.

Common vulnerabilities and their impact recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week are:

  • Vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows cyber-criminal to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. Find out its vulnerable versions from here:
  • Vulnerabilities in in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway (formerly Access Gateway Enterprise Edition) 10.1 before 10.1-126.12 allows attackers to inject malicious web script or HTML via unspecified locations. Find out its vulnerable versions from here:
  • Multiple SQL injection vulnerabilities in Dell SonicWall Scrutinizer 11.0.1 allow remote authenticated users to execute uninformed SQL commands, which will therefore allow unauthorized disclosure of information, unauthorized modification and disruption of service. Find out its vulnerable versions from here:
  • Cross-site scripting (XSS) vulnerability in IBM Business Process Manager 7.5 through 8.5.5, and WebSphere Lombardi Edition 7.2, allows hackers to inject arbitrary web script or HTML via a crafted URL. Find out its vulnerable versions from here:

There are many such vulnerable software ranked in the division of high, medium, and low severities.

To know more about these vulnerable software and the affected versions read the US-CERT Cyber Security Bulletin from here:

Posted in eScan 11, eScan 14, MailScan, Security | Tagged , , | Leave a comment

Security Attacks Hit 96% Of Organizations Last Year

Information Technology is a key ingredient that drives a business.  With the increase use of information technology in organizations, there is a growing need for adequate cyber defense techniques. Approach towards business security on a periodic basis is an important, yet commonly ignored step. This is because; administrators believe that the security policy still matches well with the organization’s needs. Such approach to security gives rise to various security issues in an organization.

Security Attacks Hit 96% Of Organizations _1

A recent 2014 Cyber Defense Maturity Report, which was conducted by IDG Connect revealed that more than 96 percent of organizations have experienced a significant IT security incident in the past year. Survey respondents included 1,600 IT information security decision makers in organizations with more than 500 employees and spanning five industries in the U.S. and Europe. As per the report, more than 43 percent respondents perceive problem prevention, identification and diagnosis as more challenging than two years ago. The report also revealed that one in six organizations had five or more significant security incidents in the past 12 months.

According to the report, most frequently seen security issues were from malware and advanced persistent threats, application and wireless security issues, network resource access problem, unsanctioned application, use of personal mobile device and data leakage. Along with this, phishing, compliance policy violations and unauthorized data access are additional reasons why organizations fall prey to attacks.

Security incidents recorded in manufacturing, education and finance sectors in general appear more prone to phishing attacks. Healthcare industry was more affected by data leakage monitoring issues, especially in the UK. On the other hand, financial institutions saw more incidents caused by phishing attacks, compliance policy violations, unsanctioned application use, and data leakage. These institutions overall found more challenging to solve the issues compared to other sectors.

However, more than half of respondents said that their organizations do not invest in the necessary skilled personnel and technologies to successfully fulfill its security mission. With regards to policy definition, technical controls and mitigation capabilities, the education sector appears the least mature while the financial sector appears the most mature.

The top five security technologies perceived to have the greatest interoperability value were firewalls, anti-malware, network access control (NAC), mobile device management (MDM), and advanced threat detection (ATD).

The report also reveals that ‘network complexity, exposure diversity and threat velocity’ are making security operations far more challenging than they were a few years ago. As a result, prevention, diagnosis, identification and remediation, over-monitoring and documentation have become extremely difficult. Scott Gordon, chief marketing officer at Forescout says that the independent research clearly validates the need for continuous monitoring, intelligence and mitigation capabilities for better security management in an organization. The complete 2014 Cyber Defense Maturity Report offers more extensive data.

Posted in eScan 11, eScan 14, MailScan, Security | Tagged , , , | Leave a comment

(Español) Los peligros de smartphones para los niños

Sorry, this entry is only available in Español.

Posted in eScan 11, eScan 14, Security | Tagged , , , , | Leave a comment