Australians who still haven’t checked to see if their computer is infected with the DNSChanger malware will need to do so this weekend before a temporary fix implemented by the Internet Systems Consortium expires on 9 July at 2pm (AEST).
DNSChanger altered computers’ Domain Name Systems server settings, allowing the rerouting of traffic in the process of translating a domain name to an IP address.
Australians can check if their computer has been affected by logging on to DNSChanger Diagnostic, a website set up by the Australian Communications and Media Authority (ACMA).
Once actions have been taken to remove DNSChanger, users should revisit the diagnostic website to check whether they remain affected by the malware.
In addition, ACMA has provided the following tips to avoid reinfection:
Install and update security software and set it to scan regularly
Turn on automatic updates for all software
Use strong passwords and different passwords for different uses
Stop and think before clicking on links and attachments.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.