From: Nige Danton on
Sorry if this has already been covered here - I have looked and cannot
see any older posts.

Malware seems to mostly rely on users downloading software that
perhaps they shouldn't e.g. hookey copies of applications etc - but
according to the article this one is concealed inside a legimate
shareware program.

Is there anything to this article and if it's true are the suggested
"malware scanners" any good? What about Little Snitch: would that be
useful in these circumstances?

http://news.cnet.com/8301-27080_3-20006502-245.html

--
Nige Danton
email: swop the obvious for g_m_a_i_l

--- news://freenews.netfront.net/ - complaints: news(a)netfront.net ---
From: J. J. Lodder on
Nige Danton <nige.danton(a)nospam.com> wrote:

> Sorry if this has already been covered here - I have looked and cannot
> see any older posts.
>
> Malware seems to mostly rely on users downloading software that
> perhaps they shouldn't e.g. hookey copies of applications etc - but
> according to the article this one is concealed inside a legimate
> shareware program.
>
> Is there anything to this article and if it's true are the suggested
> "malware scanners" any good? What about Little Snitch: would that be
> useful in these circumstances?

Yes, it should tell you the malware is trying to phone out,
and forces you to give it permission to do so,
which you can refuse,

Jan

From: Rowland McDonnell on
Nige Danton <nige.danton(a)nospam.com> wrote:

> Sorry if this has already been covered here - I have looked and cannot
> see any older posts.

No worries - seems to me that a decent on-topic post is a good thing,
even if it has been covered before. And this point has been, I suspect
- but what the hell, this is signal not noise, it's good.

> Malware seems to mostly rely on users downloading software that
> perhaps they shouldn't e.g. hookey copies of applications etc - but
> according to the article this one is concealed inside a legimate
> shareware program.

There's that route - but also the `Web browser being exploited and/or
Java being exploited to put the malware on your computer' (etc) although
that kind of thing mostly relies on security holes that only exist on
Windoze.

Mostly, I said - there are other things which are done in the world...

> Is there anything to this article and if it's true are the suggested
> "malware scanners" any good?

ClamXav is kept up to date MUCH better than Virex 7 in my personal
experience, based on me testing the two with the malware that has really
arrived here for real in real spam really sent to me.

That's all I know, though. I use ClamXav, and I don't bother with Virex
7 - which I get to use legit for free 'cos of my wife's work.

> What about Little Snitch: would that be
> useful in these circumstances?
>
> http://news.cnet.com/8301-27080_3-20006502-245.html

Hell yes.

I'd check places like:

<http://www.snopes.com/>

<http://www.hoax-slayer.com/>

(etc) for information on possible hoaxing out here on the 'net.

Rowland.

--
Remove the animal for email address: rowland.mcdonnell(a)dog.physics.org
Sorry - the spam got to me
http://www.mag-uk.org http://www.bmf.co.uk
UK biker? Join MAG and the BMF and stop the Eurocrats banning biking
 | 
Pages: 1
Prev: Wep pages not scrolling.
Next: That's betterer!...