Phishing, Spyware, Malware and Viruses
Phishing, Spyware, Malware and Viruses
Phishing, Spyware, Malware and Viruses
To everyone who uses the internet these are words that can strike fear into almost every one of you. But who knows exactly what each of them is and how you can manage them.
Access to the internet is something that is now taken as a right not a privilege but it can be a very dangerous place. Most infections appear to the user as a slowdown of your computer (it stops or hangs) or slow connection to the internet, and your browser even goes to sites that you least expect.
Let's look at each individual item:
Phishing
This is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise (usually a bank or credit union but we have seen phishing attempts for Cisco, Microsoft and Apple) in an attempt to convince the user into surrendering private information that can be used for identity theft.
The e-mail directs the user to visit a fake Web site where they are asked to update personal information, such as passwords and credit card and bank account numbers, that the legitimate organization already has. The Web site is set up only to steal the user's information.
Spyware
Spyware is any type of application that is installed on a computer either as a direct result of user intervention (you install an application that has a spyware component, usually free ware or software from Warez sites) or unknown to the user that is used to gather information about the user and upload that information to a third party.
Installation can be achieved in the following ways:
Drive by installation from a pop up window, either yes or no can install the spyware,
Installation as part of what seems a legitimate software package.
Through the infection of a virus.
Malware
Short for malicious software and is a software package designed to secretly access a computer system without the owner's consent. It covers a variety of forms of hostile, intrusive or annoying software.
Malware includes worms, Trojan horses, spyware, viruses, scare ware and the worst type which is a root kit. Malware is a vehicle for organised internet crime and contains command and control features that can direct information to their internet location. Some types of malware can even turn your computer into a zombie at the control of these crime syndicates. Your computer can then be used in coordinated DDoS attacks on legitimate business or government agencies without your knowledge.
Viruses and worms
The phrase computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. Viruses may also contain a payload that performs other actions, often malicious. On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload. A virus requires user intervention to spread, whereas a worm spreads itself automatically.
Advice for all users
The first thing to do is to make sure that your computer operating system is as clean as possible. This means that there is a level of housekeeping that you need to do. Regular scans (weekly), regular updates for both operating systems and applications (weekly or monthly) and regular updates of anti- virus (at least daily).
So what else can you do about all of the scary things on the internet? The best way is to look at the protection of your computer as an onion, the more layers the better.
A good anti Virus / anti Spyware package is essential to protect your computer. We recommend Kasperski.
Make sure your personal firewall is running when accessing web sites on the internet.
Don't download and install torrent software (music and movie sharing software) unless you know exactly what you are doing. Even when torrent software is set up correctly it opens up vulnerabilities on your computer that allows for other malicious code to execute. It also allows for external access to your computer where pornography can be stored without your knowledge.
A good internet connection system for your connection to your ISP. Although all routers and modems come with a built in firewall it is not enough to protect you from the internet and most of them are easy to bypass or stop. A reputable router is essential, even for home. Fortigate, Cisco, Juniper or Linksys have very powerful and cost effective routers that can not only protect you but can also be configured to warn you of inappropriate access both income and incoming. Most of them also have additional components, VPN, Intrusion detection and anti SPAM.
Don't access your bank account or financial information from a computer that you think has been compromised. If you are concerned about the security of your computer please contact us
A Guide To Koobface Virus Removal Regular Hepatitis Testing Can Prevent Outbreak of the Virus Best Acantispy.com Virus Removal Instructions - How to manually remove Acantispy.com? Remove System Tool Virus Virus Removal Kit Kaspersky VirusClear 2011 Removal - How To Uninstall/Remove VirusClear 2011 Easily From Your PC Anti-Virus 2011 Removal - How To Uninstall/Remove Anti-Virus 2011 Easily From Your PC Malicious Virus Removal And Avoidance Do Macs Get Viruses? Count Your Blessings Rogues are Getting Sophisticated Removal Guide- Uninstall/Remove the "Rogues are Getting Sophisticated" Virus Easily How Can I Remove Search and Destroy 2011 - Best ideas to Uninstall/ Remove Search and Destroy 2011 Virus System Tool Removal - Remove System Tool Virus Now Remove AntiMalware GO - How to 100% Remove AntiMalware GO Virus Easily and Effectively