![]() ![]() ![]() |
|
Kiwifruta: bring back those ZX81s I say!
Too right! If you want to run a program, be geek enough to type in its code from a handy Bits & Bytes magazine!
“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams
Referral links to services I use, really like, and may be rewarded if you sign up:
PocketSmith for budgeting and personal finance management. A great Kiwi company.
Dynamic:Kiwifruta: bring back those ZX81s I say!Too right! If you want to run a program, be geek enough to type in its code from a handy Bits & Bytes magazine!
networkn:
Sadly, once you start down the road of "blocking searches" it's a slippery slope.
Thats allready happening, google blocks many sites from showing in searches .
And a good thing too, once was a time when searching for a legitimate vendor(or developer) of some software, many of the hits would be
warez type sites
I guess that isnt blocking searches, but blocking search results is doable and allready happening
The people we need to worry about, dont need google to find/buy this malware anyway.
Kiwifruta: I'm not an IT professional, so looking for advice and recommendations from the IT professionals.
The other day, I read about OpenDNS' fight against ransomware by preventing ransomware from contacting its command and control centre, effectively making an installed ransomware impotent. http://info.opendns.com/rs/opendns/images/DS-OpenDNS-Combating-Ransomware.pdf
How successful have you found this approach in preventing ransomware?
I am considering switching quite a few friends over to OpenDNS to help prevent ransomware attacks.
I'll also set up Windows users with limited accounts, instead of the default administrator rights.
Does dnscrypt also help in preventing ransomware from contacting the command and control servers? Or just man in the middle attacks?
Cheers
EDIT: added link to OpenDNS pdf
Wouldn't something like Peerblock (with appropriate list) stop the phone-home ( or phone-back) scenario that the OpenDNS shows ?
Just guessing, I really have no idea ...
SepticSceptic:
Kiwifruta: I'm not an IT professional, so looking for advice and recommendations from the IT professionals.
The other day, I read about OpenDNS' fight against ransomware by preventing ransomware from contacting its command and control centre, effectively making an installed ransomware impotent. http://info.opendns.com/rs/opendns/images/DS-OpenDNS-Combating-Ransomware.pdf
How successful have you found this approach in preventing ransomware?
I am considering switching quite a few friends over to OpenDNS to help prevent ransomware attacks.
I'll also set up Windows users with limited accounts, instead of the default administrator rights.
Does dnscrypt also help in preventing ransomware from contacting the command and control servers? Or just man in the middle attacks?
Cheers
EDIT: added link to OpenDNS pdf
Wouldn't something like Peerblock (with appropriate list) stop the phone-home ( or phone-back) scenario that the OpenDNS shows ?
Just guessing, I really have no idea ...
Yes - If your list is up to date immediately upon release of crypto variant 98343473, which is unlikely.
Infection vectors we have seen were largely flash, then office docs, then executable attachments.
Only flash was a 0-interaction infection, the others all required people to actively open something.
For a desktop: Without an OS, Browser or Plugin exploit executable content can't just execute with no interaction. OS has been pretty solid lately, browsers not too bad - plugins utter garbage.
wasabi2k:SepticSceptic:Kiwifruta: I'm not an IT professional, so looking for advice and recommendations from the IT professionals.
The other day, I read about OpenDNS' fight against ransomware by preventing ransomware from contacting its command and control centre, effectively making an installed ransomware impotent. http://info.opendns.com/rs/opendns/images/DS-OpenDNS-Combating-Ransomware.pdf
How successful have you found this approach in preventing ransomware?
I am considering switching quite a few friends over to OpenDNS to help prevent ransomware attacks.
I'll also set up Windows users with limited accounts, instead of the default administrator rights.
Does dnscrypt also help in preventing ransomware from contacting the command and control servers? Or just man in the middle attacks?
Cheers
EDIT: added link to OpenDNS pdf
Wouldn't something like Peerblock (with appropriate list) stop the phone-home ( or phone-back) scenario that the OpenDNS shows ?
Just guessing, I really have no idea ...
Yes - If your list is up to date immediately upon release of crypto variant 98343473, which is unlikely.
Infection vectors we have seen were largely flash, then office docs, then executable attachments.
Only flash was a 0-interaction infection, the others all required people to actively open something.
For a desktop: Without an OS, Browser or Plugin exploit executable content can't just execute with no interaction. OS has been pretty solid lately, browsers not too bad - plugins utter garbage.
Kiwifruta:
@wasabi2k So removing adobe flash player is a must then. I read from one source that 75% of ransomware attacks came via adobe flash player.
So would removing adobe flash player and using the inbuilt flash player of Google Chrome reduce those vulnerabilities?
All our attacks were done against the Adobe Flash Player plugin in IE - chrome was unaffected. However Chrome isn't 100% immune either: http://arstechnica.com/security/2015/07/hacking-teams-flash-0day-potent-enough-to-infect-actual-chrome-user/. I think it is a case of less insecure, not bulletproof. I would say the Adobe plugin is more targeted than the inbuilt chrome one.
FlashBlock (extension to stop auto loading flash) is a good option but can be confusing for users/break sites.
Acrobat/Adobe Reader is the other big culprit - again Chrome's preview appears to be less so but isn't a full replacement.
wasabi2k:Kiwifruta:@wasabi2k So removing adobe flash player is a must then. I read from one source that 75% of ransomware attacks came via adobe flash player.
So would removing adobe flash player and using the inbuilt flash player of Google Chrome reduce those vulnerabilities?All our attacks were done against the Adobe Flash Player plugin in IE - chrome was unaffected. However Chrome isn't 100% immune either: http://arstechnica.com/security/2015/07/hacking-teams-flash-0day-potent-enough-to-infect-actual-chrome-user/. I think it is a case of less insecure, not bulletproof. I would say the Adobe plugin is more targeted than the inbuilt chrome one.
FlashBlock (extension to stop auto loading flash) is a good option but can be confusing for users/break sites.
Acrobat/Adobe Reader is the other big culprit - again Chrome's preview appears to be less so but isn't a full replacement.
Kiwifruta:
Securitywise how does Microsoft Edge compare?
What alternative to Adobe Reader would you recommend?
I use the ACC calculator https://www.levycalculators.acc.co.nz/cpx.jsp for my work. The Chrome based reader cannot use it, so I use Adobe Reader. Is there a more secure alternative to Adobe Reader that I can use with this type of file, in Windows 10 or even Ubuntu?
I'm running Windows 10 and have firefox, chrome and edge for work things.
I'll admit I am not sure about Edge - we are still a Windows 7 shop at work and I am a Chrome user at home.
As far as Adobe Reader - there are a number of third party readers, but inevitably you will come across a PDF that won't render correctly unless you use Adobe Reader. Just got to make sure that it is up to date at all times.
|
![]() ![]() ![]() |