'Browser Hijacking' the Latest Threat for Windows Users

Windows users already have enough security risks to worry about, but here’s a new one — browser hijacking.

It takes tedious, time-consuming work to undo the damage, and most users only discover the ‘hijacking’ after it’s happened. Pop-up windows overlap everywhere, the Internet Explorer home page and Web services are switched to other sites and the list of favorite sites is replaced with porn, the Washington Post reported.

In some cases, all users did was click an "OK" button that they thought was changing home-page settings or adding a Web toolbar — not knowing the damage that would result. The problem is often caused by going online with an old copy of Windows, allowing a hijacker's site to take advantage of security flaws.

The Washington Post recommends a few strategies to stop the problem. Run an up-to-date antivirus utility and firewall program and regularly download Microsoft's critical updates (windowsupdate.microsoft.com). Two of the biggest security flaws behind browser hijacking can be fixed with a pair of downloads. A third can be remedied by installing a better browser.

First, stop pop-ups by going to toolbar.google.com through Internet Explorer 5.5 or newer, or install another browser. Step two is to update the Java software on your machine. Its developer, Sun Microsystems, designed it with tight limits on what a Web-based application can and can't do. But these limits must be enforced by a "virtual machine" program that runs on your own computer, and the one Microsoft developed contained vulnerabilities that hijackers abuse. The better option is to download and install Sun's own, free Java virtual machine (www.java.com).

Step three is to eliminate ActiveX, which allows Web interactivity, but it relies on users to give the right answer when Internet Explorer asks, "Do you trust this publisher?" Click "yes" and the ActiveX program can do whatever it wants. Use an ActiveX-free browser for everyday Web use. A good Internet Explorer replacement is a free copy of Mozilla (www.mozilla.org).

If your computer has already been infected, your antivirus program should clean it out. But you may need specialized hijack-removal software, such as Hijack This! or CWShredder (both at http://www.spywareinfo.com/~merijn/downloads.html

You may like these other stories...

Event Date: May 29, 2014 In this presentation Excel expert David Ringstrom, CPA brings you up to speed on the Excel feature you should be using, but probably aren't. The Table feature offers the ability to both...
No field likes its buzzwords more than technology, and one of today's leading terms is "the cloud." But it's not just a matter of knowing what's fashionable. Accounting professionals who know how to use...
There is a growing trend of accountants moving away from traditional compliance work to more advisory work. Client demand is there, but it is up to the accountants to capitalize on that. What should accountants' roles be...

Upcoming CPE Webinars

Apr 17
In this exciting presentation Excel expert David H. Ringstrom, CPA shares tricks that you can use with pivot tables every day. Remember, either you work Excel, or it works you!
Apr 22
Is everyone at your organization meeting your client service expectations? Let client service expert, Kristen Rampe, CPA help you establish a reputation of top-tier service in every facet of your firm during this one hour webinar.
Apr 24
In this session Excel expert David Ringstrom, CPA introduces you to a powerful but underutilized macro feature in Excel.
Apr 25
This material focuses on the principles of accounting for non-profit organizations' revenues. It will include discussions of revenue recognition for cash and non-cash contributions as well as other revenues commonly received by non-profit organizations.