Windows Security offers a good first line against attacks, but it still needs additional help.
Keeping your PC safe from malware is a never-ending challenge. With new threats popping up (and then fading into the background again) all the time, we’re indebted to security experts such as Kaspersky, Norton and Bitdefender for their constant vigilance. Their security tools are constantly evolving to keep up with the changing malware landscape, but however hard they work, you can’t rely on them 100 percent to keep your protected.
Cybercriminals are increasingly preying on us directly to try and trick their way on to our machines and into our wallets. These days, you’re as likely to be the architect of your own downfall by responding to a scam alert as you are to being infected by other means. But that doesn’t mean you’re fighting a losing battle.
In this feature we’re going to reveal what types of threat are currently the most dangerous, and what you can do to ensure you remain safe from them. We’ll reveal what the latest threats are – from hack tools to adware – plus help you strengthen your network’s security and steer you towards free and paid-for tools to keep you protected. Whether you’re worried about ransomware or malicious advertising, we’ve got you covered. Make sure Windows, your applications and your security tools are all up to date, turn the page and take control of your computing security for 2020 and beyond.
The phantom menace
Adware is a growing problem, aided by social engineering. Here’s how to keep it away
The world of malware is constantly changing and evolving – who’d heard of nasties like ransomware, cryptomining or social engineering until relatively recently? In its State of Malware 2020 report, Malwarebytes noted some interesting trends. One was that malware is increasingly focusing its attentions on business rather than consumers – presumably because cyber criminals spy bigger gains to be made.
That said, don’t ditch all your antivirus software just yet – consumer infections were only down a paltry two percent on the previous year. Of more significance is the changing landscape. The biggest source of infections by far are adware – these are programs that don’t carry malware themselves, but try to trick people into either downloading malware or giving up personal details.
The biggest jump in the list is by so-called ‘hack tools’, which are again often legitimate programs that provide hackers with a way into networks (see pages 16-17). The growth in popularity of both adware and hack tools suggests that security software’s ability to spot and detect more traditional forms of malware means cybercriminals are shifting their focus towards weaker spots in your defences.
Not all newer threats stay the course: cryptomining, whereby malware allowed criminals to hijack some of your computer’s processing power to help them mine for Bitcoin and other digital currency has fallen away in popularity. But even here, new variants continue to emerge alongside existing ones, while traditional forms of infection from worms to trojans, spyware to back doors, remain a persistent threat.
Beef up the Windows Firewall’s security with this free add-in that allows you to filter outgoing traffic.
With infections on the decrease you may be tempted that now’s a good time to let your security software subscription lapse and revert to free protection.
While it’s true Microsoft Security – built on the back of Windows Defender – is scoring highly in independent malware tests (it’s currently listed as a Top Product on www.av-test.org with more established rivals), it does lack tools to help protect against wider threats. Paid-for solutions like Kaspersky (www.kaspersky.co.uk), Bitdefender (www.bitdefender.co.uk) and Norton (https://uk.norton.com) offer a more comprehensive set of tools to protect against a wider range of threats.
One of the biggest holes in Windows’ security is its built-in firewall. The irony is, the Windows Firewall can provide comprehensive protection, but by default it only monitors inbound traffic from other networked devices and the internet to your computer. Any connections originating from your PC – such as software you’ve installed (including software you may have been tricked into installing) – are ignored.
The solution is to either install a dedicated firewall with two-way protection – a standard feature in all paid-for products as well as the free standalone Comodo Firewall https://personalfirewall.comodo.com/) product – or add two-way protection to Windows Firewall itself. This is done by installing the Windows Firewall Control (www.binisoft.org/wfc), which allows you to create rules for outgoing traffic to prevent applications and processes from accessing the internet.
“Generate new, lengthy and random passwords for your core accounts”
After installation, WFC is set to continue allowing all outbound traffic by default – to start filtering it, launch the program, switch to the Profiles section and select Medium filtering (recommended). Also tick the failsafe Automatically set box. Now switch to Notifications and select Learning mode to switch monitoring on. All digitally signed and trusted apps will be given network access automatically, but you’ll start to see pop-up notifications for other apps. If they’re trusted (not all safe apps are signed), click Allow this program; if you’re not sure, Block for now and ask me later.
It’s not simply malware you need to be concerned about, but all aspects of your online life. Now is the time to tighten the security of your online footprint by using a password manager (we recommend Bitwarden – www.bitwarden.com) and two-factor authentication (manage your codes with Authy – https://authy.com) to lock down your online accounts. Take the time to generate new, lengthy (14 characters should be sufficient against any brute-force password attack) and random passwords for your core online accounts and switch on 2FA where possible.
Also consider a VPN – particularly when connecting through insecure wireless networks. This scrambles your connection so the data transmitted can’t be intercepted. Try Windscribe (https://windscribe.com), which has by far the most generous free package out there, offering 10GB per month.
Finally, help ensure all your software stays updated with the help of Patch My PC (https://patchmypc.com/ home-updater-overview).
Your browser and security tools can intercept most – but not all – fake websites.
Attack of the PUPs
Keep annoying bundleware off your PC with our guide to potentially unwanted programs
As reported on the previous page, the biggest individual threat to consumers these days comes from adware. In the past, adware tended to simply mean ad-supported software, and later it evolved to include so-called PUPs (potentially unwanted programs), which are offered alongside the original program during installation. Sometimes these unsolicited extras are flagged and easy to avoid, but some use deliberately misleading language and confusing options to trick you into installing them.
These days, PUPs are better known as bundleware, and are usually more annoying than outright malicious – most are ignored by your security software, so you’ll need additional help: Unchecky (www.unchecky.com) offers limited free protection, but Malwarebytes Premium is by far the best at blocking these.
Most PUPs should be removable via ‘Settings > Apps > Apps & Features’, but third-party apps make them easier to spot – IObit Uninstaller (www.iobit.com/ advanceduninstaller.php) is one such tool with a dedicated Bundleware section, but it ironically offers bundleware as part of its own setup process (IObit’s free Advanced SystemCare Free tool).
Unchecky doesn’t simply untick potential PUPs, it’ll warn you before inadvertently selecting one.
Social engineering scams
Adware as a threat has shifted away from being merely annoying and is now considered dangerous once again. That’s because it’s often used to identify software used by scammers to try and hack people’s computers through social engineering.
Continue reading your story on the app
Continue reading your story in the magazine
THE YEAR OF 5G
We’re on the cusp of a mobile revolution: as new 5G phones connect to new 5G networks across the UK. You’ll be able to enjoy super-fast, super-stable data access wherever you may roam.
Learn how to....Make your mouse and keyboard easier to use
“Windows 10 includes numerous options that can enhance the way you interact with it – we reveal how to make your input devices easier to use”
LOCK IT DOWN!
Nick Peers reveals how to make your PC secure against malware and other threats
Learn how to…Enhance skies in Luminar
“Luminar’s latest update is full of tools to make the skies in your images more interesting”
How to zip and unzip files
“Whether you’re freeing up storage space or sending lots of files to other people, Windows’ built-in file zipping will make your life so much easier”
Back up important data with File History
“The File History feature of Windows 10 can be used to roll back to earlier versions of documents, or just create backups of all your important files”
Business inkjet with true A3 ability
Asus ZenBook Flip 15
A capable and premium 2-in-1 laptop
SPEED UP WINDOWS
ALL THE BEST TIPS AND TRICKS TO MAKE YOUR OPERATING SYSTEM RUN FASTER
Learn how to… Use emoji when writing in Windows 10
Your guide Mark Wyciślik-Wilson says…“You’re probably used to adding emoji to text messages and social media posts, but you can also use them within Windows via the emoji keyboard”
Q&A: BITCOIN'S MASSIVE RISE AND WHAT COMES NEXT
The digital currency Bitcoin rocketed to a record high last week above $40,000 a coin.
Kaspersky Secure Connection VPN: Limited but Very Affordable
A virtual private network (or VPN) is an easy way to improve your privacy online. Kaspersky Secure Connection carries one of the most recognizable names in the industry and offers customers a simple, affordable VPN. It is a bare-bones offering with few server locations, but Kaspersky users and anyone looking for a cheap VPN will likely be pleased.
FLORIDA TEEN ARRESTED AS MASTERMIND OF TWITTER HACK
A Florida teen was identified last weekend as the mastermind of a scheme earlier this month that commandeered Twitter accounts of prominent politicians, celebrities and technology moguls and scammed people around the globe out of more than $100,000 in Bitcoin. Two other men were also charged in the case.
Q&A: WHAT'S BEHIND THE TWITTER BITCOIN HACK?
Hackers broke into the Twitter accounts of world leaders, celebrities and tech moguls last week in one of the most high-profile security breaches in recent years, highlighting a major flaw with the service millions of people have come to rely on as an essential communications tool.
Breakthrough Technologies For Surviving a Hack
How a big manufacturer beat ransomware attackers without paying the ransom
The Milestone Coin Auction with Magical Immunity
MILLIONS OF DOLLARS IN RARITIES WERE HAMMERED DOWN DURING A GLOBAL PANDEMIC
Microsoft begins blocking ‘unwanted applications' like adware, using Edge
The new anti-PUA feature must be manually toggled on, however.
10 Small Business Ideas That You Can Consider for Spring
Spring is a time for renewal. The long winter has come and gone, replacing blustering winds, leafless trees and frosty mornings with newborn lambs and the first rays of summer. Flowers aren’t the only things that start to sprout up in spring though; it’s the perfect opportunity for a new small business to make its mark.
Cutting To The Chase
Kyle Cassidy and three other members of the Annenberg (Lunchtime) Running Group were stretching on the grounds of the University of Pennsylvania, waiting for a few stragglers.
A Note From The Bubble Opportunity Hedge Fund
Why we all love to spot other investors’ mistakes