Friday, May 3, 2013

Massive package: it is possible to infect an Android phone to plug it into a ... - Globo.com

And also answer questions today about the safety of anonymous browsing and use of the program TrueCrypt.

If you have any questions regarding information security (antivirus, invasions, cybercrime, data theft, etc.), go to the end of the story and use the comments section. This column answers questions left by readers all Thursdays.

>>> Anonymous Browsing and viruses

Please’m distressed. I went on a website containing information of narcotics out of curiosity via a USB stick and using an application that guarantees anonymity network called Tor Browser. But not deactivated javascript and accept cookies from sites. The result is that a harmful file infected my flash drive and suddenly my backup was enabled to be stored at the pendrive. In desperation I disconnected the internet, shut Tor and canceled the backup operation. But now I can not sleep well because I’m afraid someone has stolen my files from my computer. Someone who understands that sends me an answer? I’m desperate. Rone

Javascript and cookies are not enough to infect a computer, Rone. You probably forgot to install any security updates for your web browser, if an infection actually happened.

If you

quickly took the precautions mentioned, it is unlikely that your data has been sent. In general, digital pests do not steal information stored on computers indiscriminately. They seek useful information, such as files where web browsers store passwords – these are the first information stolen by a virus.

Then the plague digital is monitoring the computer to capture keystrokes, e-mail and other information you find useful code.

Only certain types of viruses are searching for specific files, such as documents, images or designs of engineering drawing. These pests are typically more sophisticated. I do not know which files are among those who suspects that you may have been stolen, but a virus has no way to “guess” where are your most important information. Remember that.

>>> TrueCrypt
I created a volume of encrypted files in TrueCrypt [program to "scramble" your data and know more about it ] 5GB. So far so good, I put all my files, and always wanted to see them, I rode and then dismounted [action TrueCrypt] , but my computer crashed; then I had to format it. Was able to retrieve the file from TrueCrypt, but how do I open to? Because the program has been deleted … how to reinstall TrueCrypt volume and add that it had and then ride?
Fabio Wagner

Sure, Fabio. To download TrueCrypt, just go to the official site downloads TrueCrypt (click here) and click “Download” button on the equivalent of your system (Windows must be, but you did not specify).

Then just open the TrueCrypt, click right on one of the volumes and select the “Select file and Mount”. The program will prompt you to choose the file to be mounted TrueCrypt.

Mounting volumes in TrueCrypt. (Photo: Playback)

Of course you’ll need your password, if you created a TrueCrypt volume with password (that’s how TrueCrypt volumes should be).

>>> Pests in Android
Altieres, I wonder if the only way to get viruses on an Android phone currently is through malicious applications and plugging Android on PCs infected with pests for Android. For example, if I’m browsing in Chrome on Android can get viruses on this system? Thank you!
Fraccini Carlos

Plugging an Android on an infected PC is not sufficient to infect an Android phone, unless your PC is authorized and able to replace the firmware of the phone, which is the operating system itself. That’s because a PC can not just run an application on Android, and Android does not automatically run any application that is memory reserved for data.

Of course, if there is a way to run this application, whether for breach of security or a sense of “expediency” by some manufacturer, the story will be different.

Overall, no system can be infected without you run a program – and this is true even for Windows. There are exceptions, and highlight two: the system is not running (for example, you can infect Windows by starting a computer with a CD and modifying files from HD to infect them, on the phone, there is a firmware update, which also occurs with the system off) or there is a security flaw in the system or some application (if simply visiting a site and get infected).

Almost all cases of infection that do not involve the direct execution of an application fall in these two situations. Another possibility, of course, is to change something in the application itself (eg, browser extensions).

Column Digital Security today will stop here, but every Thursday I’ll be back with more answers to questions from readers. Do not forget to write in the comments field below.

share
  • Orkut
  • live
  • google
  • delicious

No comments:

Post a Comment