Australians who still haven’t checked to see if their computer is infected with the DNSChanger malware will need to do so this weekend before a temporary fix implemented by the Internet Systems Consortium expires on 9 July at 2pm (AEST).
DNSChanger altered computers’ Domain Name Systems server settings, allowing the rerouting of traffic in the process of translating a domain name to an IP address.
Australians can check if their computer has been affected by logging on to DNSChanger Diagnostic, a website set up by the Australian Communications and Media Authority (ACMA).
Once actions have been taken to remove DNSChanger, users should revisit the diagnostic website to check whether they remain affected by the malware.
In addition, ACMA has provided the following tips to avoid reinfection:
Install and update security software and set it to scan regularly Turn on automatic updates for all software Use strong passwords and different passwords for different uses Stop and think before clicking on links and attachments. Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia