Security Information |
|
The Top Twelve Threats No Computer User Should Ignore
The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content. However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. These are the Top Twelve Threats No Computer User Should Ignore. 1. Viruses - A computer program that copies itself. They often disrupt your computer system or damage your data. Viruses are usually received by email attachments so be careful opening anything from a dubious source. They can affect anyone, for example, the destructive Mydoom worm affected one out of three small and mid-sized businesses. 2. Spyware - Sends information about you and your computer to somebody else. Spyware may send the addresses of sites you have visited or worse still, transmit personal information. With today's concerns about identify theft this is a real worry. For example, CoolWebSearch may hijack web searches, home page, and other Internet Explorer settings. Spyware is normally received as part of shareware or freeware downloaded from the web. 3. IP Spoofing - A technique to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host. 4. Trojans - An apparently legitimate computer program that is really intended to disrupt and damage computer activity by sending information, perhaps even passwords onto a third party without you knowing. As an example, recent emails entitled "Osama Bin Laden Captured" attempted to download the "Trj/Small.B." Trojan if the embedded URL was clicked. This trojan attempts to hijack the PC. 5. Spam - Unsolicited mail often promoting products of a dubious financial or sexual nature. Don't leave your email address on websites and internet bulletin boards as they are harvested by spammers. 6. Adware - puts advertisements on your screen. These take many forms including popups, popunders and advertisements that appear later, even if your browser is closed. Some are sent using the Windows Messenger service which allows a spammer to direct an advertisement straight to your computer by sequentially sending messages to IP addresses. Always irritating, they are also often of a pornographic nature. 7. Diallers - for those of us still with dial up modems, dialler programs redirect calls to a very expensive number. You won't know until you get the bill. 8. Hijackers - Hijackers take control of your web browser and may reset your home page, search bar and search pages. They can redirect you to undesirable sites or stop you going to particular sites. 9. Hackers - With so much personal data available online to anyone with a password you must be sure your password is secure. If you are using your mother's maiden name, your cat's name or your birthday then your password is at risk. Here are two tips for making a secure password. Method One - pick two random unrelated three letter words and two digits. Mix them up and what do you have? A secure password such as "red19cat" or "hotpin73". Method Two - pick a short sequence of words such as Now Is The Winter Of Our Discontent Made Glorious' and you have a password of "nitwoodmg". You could even change the I's and O's to digits. 10. Phishing - Emails purporting to come from reliable sources such as Paypal, Ebay or your bank. Often wanting you to verify your account details, they can look very realistic but are generally scams to harvest usernames and passwords. Always open a new browser winder and type the address there, rather than clicking on the link provided. 11. Hoaxes - Chain letters, scams, false alarms. At best they take up time and bandwidth but at worst vulnerable can be victims of fraud. Pass it on! 12. Stranger-danger - For those of us with children - do you know what they actually do when they are online? Are they working on homework tasks, downloading illegal music or pornography? Or are they chatting to strangers in chat rooms? You should consider blocking access to undesirable sites and logging their activity with a surveillance tool. Oh, and don't forget that where children are concerned, computers should always be kept in a family room and never in their bedroom. Three Step Action Plan There are three basic, essential steps that should be taken to ensure your PC is kept threat-free. Firstly , be sensible when opening attachments or following email instructions from apparently reputable sites. Secondly , make sure you are using the latest service pack of Windows as Microsoft is continually closing loopholes to tighten up security. Finally, there's a range of low cost tools such as firewalls, antivirus, spam blockers and spyware killers available. Like everything else they vary in quality and you tend to get what you pay for so always do your research first and perhaps try a free trial before getting your credit card out. The author, Kai Chandler, edits http://www.surfcontrols.com which specializes in providing reviews and recommendations of top-rated tools to help protect your online experience.
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review Canada Releases Defense Policy Update to Boost Security Department of Defense NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post FCC proposes BGP security measures Network World Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe RSA Conference 2024: AI and the Future Of Security Security Boulevard Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Votiro Keeps Up the Momentum in 2024 Security Boulevard A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State The Best Home Security Systems of 2024 Security.org The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard The Dell API Breach: It could have been prevented Security Boulevard 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun Making Safety and Security Intrinsic to School Design Campus Security Today Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard U.S. Security Cooperation with Ukraine - United States Department of State Department of State Belgium cuts off ticket sales for soccer match against Israel over ‘security concerns’ The Times of Israel Security fog machine helps deter burglars from Chatsworth business FOX 11 Los Angeles French security forces impose 'calmer' situation in New Caledonia under emergency powers FRANCE 24 English In first, UN Security Council holds meeting solely focused on hostages held by Hamas The Times of Israel Donald Trump to visit St. Paul. What are the security expenses? St. Paul Pioneer Press |
RELATED ARTICLES
The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Everything You Need To Know About Spyware and Malware You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. |
home | site map |
© 2006 |