Web Hosting News

  Home arrow Web Hosting News arrow Page 4 - Hosted in China: Malware-Infested Web ...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Hosted in China: Malware-Infested Web Sites
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 3 stars3 stars3 stars3 stars3 stars / 2

    Table of Contents:
  • Hosted in China: Malware-Infested Web Sites
  • Changing Threats
  • Why Hackers Spread Malware
  • Protect Your System Online

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Hosted in China: Malware-Infested Web Sites - Protect Your System Online

    (Page 4 of 4 )

    So what can businesses and web surfers do to protect themselves from this growing threat? While it is true that three countries currently host just over three-quarters of all malware-infested web pages, avoiding web sites hosted in China, the United States and Russia won't work. "Hackers are hijacking web sites around the world to make them point to malware on sites based in China, the U.S. and Russia," noted Carole Theirault, Sophos senior security consultant.

    So what does work? According to Genes, if you're a business it is very difficult (unless you adopt some of the consumer practices, which will be discussed in a bit). Email security can be outsourced, but with Internet security, "You're talking about massive investments from the hosting sites to do this at an acceptable speed via an external proxy. I haven't seen this model really working. There are some start-ups offering this, but I wonder how much money they lose every month."

    If you're a consumer, you should regularly patch your operating system and your browser. Genes advises the use of alternative browsers, and against the use of widespread browsers like Internet Explorer. "This doesn't mean that FireFox does not have vulnerabilities," he explained, "but most of the Web threats we are seeing are connected to having Internet Explorer. By moving to an alternative browser, you already do a kind of risk mitigation."

    Another important step a consumer can take is to install security software. Genes sees this as a baseline step that everyone should take, rather like patching an operating system. The Trend Micro CTO offers this cautionary note, however: "We could come out and say we will be able to protect all our users. Be we never will be able to offer 100 percent protection. Nobody can."

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap