img not found!

Tag tablet backup.tablet cover

What are Trojans ?

Looking at common terms within the IT world we look today at Trojans.

Trojans are malicious programs that perform actions that have not been authorised by the user. These actions can include:

Blocking data deleting data modifying data copying data disrupting the performance of computers or computer networks

Unlike computer viruses and worms, Trojans are not able to self-replicate.

How Trojans can impact you

Trojans are classified according to the type of actions that they can perform on your computer:

  • Backdoor
    A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
  • Exploit
    Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
  • Rootkit
    Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
  • Trojan-Banker
    Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
  • Trojan-DDoS
    These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.
  • Trojan-Downloader
    Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
  • Trojan-Dropper
    These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
  • Trojan-FakeAV
    Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.
  • Trojan-GameThief
    This type of program steals user account information from online gamers.
  • Trojan-IM
    Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
  • Trojan-Ransom
    This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
  • Trojan-SMS
    These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.
  • Trojan-Spy
    Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
  • Trojan-Mailfinder
    These programs can harvest email addresses from your computer.
  • Other types of Trojans include:
    • Trojan-ArcBomb
    • Trojan-Clicker
    • Trojan-Notifier
    • Trojan-Proxy
    • Trojan-PSW

How to protect yourself against Trojans

SOSBy installing effective anti-malware software, you can defend your devices – including PCs, laptops, Macs, tablets and smartphones – against Trojans. A rigorous anti-malware solution will detect and prevent Trojan attacks on your PC anti-malware products that defend the following devices against Trojans:

  • Windows PCs
  • Linux computers
  • Apple Macs
  • Smartphones
  • Tablets

We can advise on and install anti-malware products at MBM

New labelling System helps IT Support Customers

MBM is rolling out a new system for managing customers’ devices which are included in their IT Support contract with MBM. The new labels, which are easily identifiable, will be placed on all equipment covered by MBM.

MBM

 

 

 

 

 

 

The labels include a unique QR Code which provides MBM with all the information we need about the hardware including: device type, age, owner, location and support history.

Jason Timmins, technical director at MBM, explains: “It’s important for both our customers and our support team that we can easily identify a device when there is a problem. The new asset labels will help to provide us with a more streamlined process for repair, maintenance and inventory.”

The new labels will be rolled out during planned site visits. For more information contact jason@mbmltd.co.uk

Tip

Buying a computer for Christmas? Read this

With Christmas around the corner – news from Industry analysts that more than half of next years computer sales will not be laptops or desktop computers

New research from digital consultancy Canalys suggests that tablet computers will make up more than 50 per cent of all computers sold in the world next year, and Android-based tablets are expected to outsell Apple iPads by a factor of two to one.

TabletGlobally, the worldwide computer market expanded by 18 per cent last year, even as sales of conventional desktop and laptop computers continued to decline. In relatively short order, tablets have grown to make up 40 per cent of all computer sales, a ratio that’s expected to tip over to the other side some time next year.

There will be around 285 million tablets sold around the world next year. That contrasts with an expected 192 million laptops and 98 million desktops. Canalys expects the tablet figure to grow even more, to 396 million by 2017, while the other two categories steady out.

Although Apple has lost its dominance in the tablet market it practically invented with the iPad, it nonetheless maintains the edge in profitability from the devices.

“Apple is one of the few companies making money from the tablet boom,” Canalys senior analyst Tim Coulling said. “Premium products attract high value consumers; for Apple, remaining highly profitable and driving revenue from its entire ecosystem is of greater importance than market share statistics.”

Outside of the big two, Canalys says Microsoft could be poised to make exponential gains from an admittedly small base. Microsoft made up about two per cent of all tablet sales in 2012. Canalys expects its sales to more than double to as much as five per cent by the end of next year.

“To improve its position it must drive app development and better utilize other relevant parts of its business to round out its mobile device ecosystem,” said Canalys research analyst Pin Chen Tang.

We are happy to maintain your Tablets too – contact Nigel at MBM for more.

Our Office Hours

contact

Do you have any questions?