NSSLabsconducted a test in which the Eight browsing programs
Qihoo 360 V 6.3.1.132
Firefox V 27.0.1
Google Chrome V 6.3.1.132
Internet Explorer V 11.0.9600.16384
Kingsoft Liebao V 4.5.37.6837
Opera V 19.0.1326.63
Safari V 5.1.7 (7534.57.2)
Sogou Explorer V 4.2.6.10812
Environment
Operating System:
Windows 8.1 Enterprise with Windows Defender disable
Security Stack:
Testing Methodology V1.5
Eight leading browsers, including three from China, were tested against the Security Stack: Testing Methodology V1.5, using 657 samples of socially engineered malware (SEM) that were captured over 14 days in NSS Labs’ unique live testing harness. SEM attacks use several different methods to deceive users into downloading malicious software, but the browser is the primary vector for
delivery of SEM and therefore is the first line of defense against such attacks.
NSSLabsrecently conducted a test in which the five leading browsing programs
Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox and Opera had to demonstrate their ability to protect against socially engineered malware downloads.
A total of 754 real cyberthreats were used in this comparison. All five browsers were subjected to 550 test runs against these 754 unique malware URLs, resulting in over 18,000 test cases per browser.
Fig. 1. Source: NSSLabs
Figure1 shows that Microsoft and Google are ahead of Apple, Mozilla, and Opera in terms of built-‐in download security protection; however, further analysis is necessary to explain adequately the difference in 99.96% and 83.16% protection rates between Internet Explorer and Chrome. These differences in protection are far from linear.
If you haven’t fixed your System and lose access to Internet, Then you will have to call up your ISP and go through all the fuss of resetting your IP Address and may even have to pay your ISP to do that.
After the US Court Order expires on 9th July 2012, The FBI will shut down all the rouge servers and if you have not cleaned up your infected system by then, You may very well lose access to your favorite Facebook or Youtube. Yeah even Google!
The malware reroutes internet traffic through compromised servers, opening the infected systems up to the dangers of Keyloggers,Trojans and other Malwares which may steal your web experience and manipulate them, Steal credit card details and much more.
According to the DNS Changer Working Group, as of July
4, there are 45,619 IP Addresses infected in USA, The next is Italy with 21,831
IP Addresses followed by 19,642 IP addresses infected in India.
So, How to Identify If Your System Is Infected with DNS Changer Malware.?
Just Follow the Steps...!!!!!
Step 1. Visit the following sites and Check the report given by them.
Additionally, You can manually confirm if you are infected by the malware by checking if your DNS has been changed to rouge ones. Step 1 (a). Open command prompt (Run > cmd). Step 1 (b). Enter the following command : ipconfig/all Step 1 (c). Find the DNS Server column in the result and copy it. Step 1 (d). Go to the FBI DNS Check page and enter the DNS you copied and paste in the box followed by clicking ‘Check my DNS’. If you got “Your IP is not configured to use the rogue DNS servers. ” Then you are safe........................... Step 2. If they show your system as Clean, Then you are safe and have nothing to worry about losing Internet access. But if you are shown as infected then there are certain tools that will help you fix the system.
To remove dns changer malware from your system you can use any of these recommended softwares by Top Security Companies. Just download and follow the instructions of the software. The softwares are as follows: