{"id":75,"date":"2012-02-21T10:35:00","date_gmt":"2012-02-21T15:35:00","guid":{"rendered":"http:\/\/blog.computerworksmi.com\/?p=75"},"modified":"2012-02-10T12:37:28","modified_gmt":"2012-02-10T17:37:28","slug":"infections-in-the-real-world-part-1","status":"publish","type":"post","link":"https:\/\/blog.computerworksmi.com\/?p=75","title":{"rendered":"Infections in the Real World, Part 1"},"content":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of possibilities and opinions that each infection seems to have.<\/p>\n<p><em>Part 1: The Zero-Day Threat<\/em><\/p>\n<p><strong>What Is a Zero-Day Threat?<\/strong><\/p>\n<p>A zero-day threat is a piece of malware that is not recognizable by your protection software because it does not match up to previous infections in the software\u2019s database. These threats exploit vulnerabilities that were probably previously unknown and have not been patched yet. Some zero-day threats have the ability to polymorph, which means the malicious portion of the code changes every time the infection is encountered.<\/p>\n<p><strong>The Real Life Example<\/strong><\/p>\n<p>Last spring, attackers managed to exploit a zero-day vulnerability in Adobe\u2019s Flash, causing the attackers to gain access to security company RSA\u2019s servers and sensitive information. The multi-layered attack targeted unwitting employees of RSA through an email claiming to be from the company\u2019s human resource department. When employees opened the spreadsheet, they inadvertently activated the malicious code within the infected file.<\/p>\n<p><strong>How Do I Protect Myself?<\/strong><\/p>\n<p>Without very expensive, corporate-level software, the average person can only do so much to protect themselves from zero-day threats. Keeping your operating system and antivirus as up to date as possible and making sure that you look before you open things are the only ways to keep yourself from catching a zero-day infection.<\/p>\n<p>However, to put it into better perspective, most zero-day threats do not target the average home user. Many zero-day threats are designed with attacking specific companies or organizations in mind and won\u2019t do much good if someone else happens to contract the infection on accident.<\/p>\n<h6>Computer Works would like to thank Sophos for information used to write this article.<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of &hellip; <a href=\"https:\/\/blog.computerworksmi.com\/?p=75\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,13],"tags":[8,12,9,11],"class_list":["post-75","post","type-post","status-publish","format-standard","hentry","category-onlinesafety","category-tipsandtricks","tag-emailsafety","tag-socialnetworkingsafety","tag-virusesmalwarespyware","tag-whatdoesthatmean"],"_links":{"self":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75"}],"version-history":[{"count":1,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions"}],"predecessor-version":[{"id":76,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions\/76"}],"wp:attachment":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}